a, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x100) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000000c0)=0xf0bb, 0xffd8) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:13:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0xf0ffffff, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4c000000) 05:13:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 271.215941] loop2: p1 p2 p3 p4 < > [ 271.223642] loop2: partition table partially beyond EOD, truncated [ 271.265133] loop2: p1 start 1 is beyond EOD, truncated 05:13:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x7d29, 0x9}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@can, 0x80, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f00000002c0)=""/247, 0xf7}, {&(0x7f00000003c0)=""/144, 0x90}, {&(0x7f0000000480)=""/113, 0x71}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x5}, 0x40000000) getsockopt$inet6_buf(r0, 0x29, 0x4, 0x0, &(0x7f0000000100)) [ 271.305573] loop2: p2 start 101 is beyond EOD, truncated [ 271.391301] loop2: p3 start 201 is beyond EOD, truncated [ 271.399191] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 271.422326] loop2: p4 start 301 is beyond EOD, truncated 05:13:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x400000) 05:13:55 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x9, 0x103800) write$tun(r0, &(0x7f0000000180)={@val={0x0, 0xfa3f}, @void, @ipx={0xffff, 0xff, 0x1ff, 0xb48f7592e9963627, {@broadcast, @broadcast, 0x3f}, {@random=0x7, @current}, "5a92289dfa791344802281b88d9062f256756711614785b8220ed89a1e4c38260c4d8e7e0d1d6c1bb0d2bdbcf85c6dd62cb59629d9e064e09088caeacc097c354cc5b3d132725ac41b2924a92d1dbaec19aeef09f0229a0639d1a790e0e1c9b70c31687bfe54c0bd7d4b9a1a44b97710523a6cf39656f5aa801575e251da628b138d8762a9376dd737875e57f6d31d67bbf36327f68c1e419e4a5246c99fdf03ab75c028acf38e5eeb1a1752dae0537fee74ec3627bc5309f4294e1d583f01dd3b848172222e810a01e3f2e5309cfb056705fa535831e1d4d18e8b71ff19f66c1a"}}, 0x103) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x8001) alarm(0x8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @empty, 0x2}, 0x1c) 05:13:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7a, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 271.840591] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 271.881746] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 272.050392] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x10) 05:13:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x48, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) timer_create(0x6, &(0x7f0000000140)={0x0, 0x35, 0x0, @thr={&(0x7f0000000040)="e3fe2696aa6737b9c1c5a51d7e9b2ecc5611799c3a7edfdf942b3f04621801b298ad3353f6deb71ea29f0589a6f1a64068a578ccb458418dd0f607da7b0b7f", &(0x7f00000000c0)="8e859d8521b550b9f3b841852eb4040b8738adc57d658b7760a171c887cc5303abdc2e2947b7524ee16889f0e9207655d5db4373bb16c2285ab9f597d518efb5b1c14e2413d1751a14febf39eef8f1abb375f42c8baf40a58f0bc47a09afbaedece6ecad1558724faa42aaa6ca44516ebf65ae13393f2217c86d30d1"}}, &(0x7f0000000180)) [ 272.472327] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:55 executing program 1: clone(0x2003ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000200)=0x8) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x80) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000180)=0x1ff) ptrace(0x10, r1) ptrace$getregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) ptrace$setregs(0xffffffffffffffff, r1, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) r3 = socket$inet6(0xa, 0x4, 0x4) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r3, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:13:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4800) 05:13:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:56 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x100, 0x10001) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x7ffff, 0x3fffffff) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) 05:13:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x3) 05:13:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 272.948921] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000240)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000280)=r2) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0xffffffffffffffe0, [0x966, 0x9, 0x7, 0x3, 0x8, 0x3, 0x4, 0x7fffffff, 0x416, 0x8, 0x8000, 0xbb9f, 0xffffffffffffffff, 0x800000, 0x7, 0x100000001, 0x1432, 0x79, 0x6, 0x1000, 0xa852, 0x0, 0xd, 0x7f, 0x1, 0x6, 0xfffffffffffffffe, 0x52, 0x4, 0x400, 0x9, 0x3, 0x20, 0x1, 0x8, 0x2, 0x6c, 0x41c7, 0x100000001, 0x5, 0x1, 0x6, 0x8, 0x2, 0x6, 0x0, 0x1f, 0x4], 0x7}) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xffffffff80000001, 0x101000) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000180)={[{0xdc, 0x2, 0x6, 0x5, 0x7, 0x9, 0xffffffffffffffff, 0x79, 0x2, 0xffffffffffff8567, 0x0, 0x5, 0x1000}, {0x7, 0x8, 0x8, 0x2, 0x7fffffff, 0x0, 0x79231b0e, 0xf63, 0x5f70, 0x7ff, 0x249e, 0x401, 0xe5c}, {0x8, 0x8, 0x4, 0x6, 0x6d, 0x7f, 0xd5, 0x6, 0x7, 0xaadeb04, 0x9, 0x96, 0x3ff}], 0x5}) 05:13:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6b6b6b00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x2, 0x2) getpeername$netlink(r1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff}) connect$bt_rfcomm(r2, &(0x7f0000000140)={0x1f, {0x3, 0x400, 0x5296c167, 0x0, 0x3ff, 0x4}, 0x10001}, 0xa) 05:13:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xfffffffd) 05:13:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) accept$nfc_llcp(r0, 0x0, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:13:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7) 05:13:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0xf0b7, 0x4) mlockall(0x5) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:13:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x3f000000) 05:13:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:57 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000100)) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000001c0)={0xf, @output={0x1000, 0x1, {0x500000000000, 0x6}, 0x4, 0x1}}) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20001, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f00000000c0)) getsockopt$inet6_buf(r1, 0x29, 0x400000000000a, 0x0, &(0x7f0000000000)=0xffffffffffffff1e) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x2, 0x4) [ 274.350292] loop2: p1 p2 p3 p4 < > 05:13:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x400000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 274.385969] loop2: partition table partially beyond EOD, truncated 05:13:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4000000000000000) [ 274.455164] loop2: p1 start 1 is beyond EOD, truncated 05:13:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x23, 0x0, &(0x7f0000000040)) [ 274.540090] loop2: p2 start 101 is beyond EOD, truncated [ 274.546161] loop2: p3 start 201 is beyond EOD, truncated [ 274.571344] loop2: p4 start 301 is beyond EOD, truncated 05:13:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x820e, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:13:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=""/183, 0xb7, 0x0}}, 0x10) sysfs$1(0x1, &(0x7f0000000300)='\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x2, 0x40) r3 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x200000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x94, r4, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb4fd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x36}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}]}, 0x94}}, 0x20008080) renameat(r2, &(0x7f0000000240)='./file0\x00', r3, &(0x7f00000002c0)='./file0\x00') 05:13:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x20000000) [ 274.937540] EXT4-fs: 7 callbacks suppressed [ 274.937551] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x8}}, 0x0) 05:13:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 275.076853] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 275.397468] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x20001981}}, 0x0) [ 275.450378] loop2: p1 p2 p3 p4 < > [ 275.467368] loop2: partition table partially beyond EOD, truncated 05:13:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 275.545400] loop2: p1 start 1 is beyond EOD, truncated [ 275.569119] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 275.591869] loop2: p2 start 101 is beyond EOD, truncated [ 275.609046] loop2: p3 start 201 is beyond EOD, truncated 05:13:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x3000000) [ 275.616762] loop2: p4 start 301 is beyond EOD, truncated 05:13:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:13:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000002c0)=']em0&em1\x00') mknod(&(0x7f0000000240)='./file0\x00', 0x122, 0x10000) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x13f, 0x4}}, 0x20) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xdf04, 0x210000) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x7, 0x12, 0x4, 0x19, "d2f1e6de98c66ad0b409c11e2c92fa38eedfa5745108e40a1ce3ed168a56bc350180ca87420c861a6a51741764618485c3aebacbd7c8124139c8799ac558d305", "d3e6bac88d3a13be60749054484845c02543ac7e46dd2b3e828d35fe0eed2b42", [0xffffffff, 0x1a81]}) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) rt_sigprocmask(0x0, &(0x7f0000000040)={0x6}, &(0x7f00000000c0), 0x0) rt_sigprocmask(0x1, &(0x7f0000000200), 0x0, 0x8) 05:13:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x7ffff000}}, 0x0) [ 275.969064] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000a0a07021dfffd946fa2830020200a0009040008000000680c1baba20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0xd0, &(0x7f0000000040)=0xf0b4, 0x28a) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x6c, "d02d45ef53129ef330d33b511f0ec9f413c586bb886126ef84aa633eb31288cc1a14df8aee0e7b30f431e750d53ea71ecb15718e060342439a8e5b1ec3e211a2bdc1a0d872961245f3103eb3158513c2600af7b059da5442307fc73ad2f20ec9d06914271a65ef228a42e31c"}, &(0x7f0000000140)=0x74) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000180)={r2, 0x7}, 0x8) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:13:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x5) 05:13:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 276.061450] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x2}}, 0x0) [ 276.118173] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:13:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 276.172322] audit: type=1400 audit(1545369239.480:52): avc: denied { setopt } for pid=11231 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 276.205736] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:13:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) 05:13:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0xfffffdef}}, 0x0) 05:13:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:13:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xffffff97) 05:13:59 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x101002) membarrier(0x29, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000180)=0x10000, 0x4) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 276.474225] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x7ffff000}}, 0x0) [ 276.587555] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:13:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'lo\x00', {0x2, 0x4e24, @loopback}}) 05:14:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x7ffff000}, 0x0) 05:14:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xfdffffff00000000) 05:14:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 276.881457] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x82, 0x200) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x7, 0x400000) timerfd_gettime(r1, &(0x7f0000000180)) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "43e9ea2344dbc67c9459c7364835af89f1783446"}, 0x15, 0x1) 05:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x2}, 0x0) 05:14:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x7ffff000}}, 0x0) 05:14:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xfeffffff00000000) 05:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0xfffffdef}, 0x0) 05:14:00 executing program 1: r0 = socket$inet6(0xa, 0x804, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000140)=""/191) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1f, 0x200400) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000000c0)) getsockopt$inet6_buf(r0, 0x29, 0x46, 0x0, &(0x7f0000000040)) [ 277.370325] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x500000000000000) 05:14:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x8}, 0x0) 05:14:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x7ffff000}}, 0x0) 05:14:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000000c0)={0x7ff, "cd7dd4b7833efb7f8a3e8068d5f5d21ae717ab37f5d7bfe860c7fd3a96eb992d", 0x0, 0x4, 0x10000, 0x4, 0x2}) 05:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x20001981}, 0x0) 05:14:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0xfffffffffffffd96) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0xf0ffffff}, 0x0) 05:14:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x1f000000) 05:14:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0xffffff8d}, 0x0) 05:14:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b4, 0x4) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x800, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f00000000c0)) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0xffffff7f00000000}, 0x0) 05:14:01 executing program 1: r0 = socket$inet6(0xa, 0x10007ff, 0x9) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x48000000) 05:14:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x5, @local, 0x8}}, [0x8, 0xfffffffffffff801, 0x88, 0x8, 0x3, 0x1000, 0x4, 0xef7, 0x6, 0xcdef, 0x2, 0x3, 0x8, 0x1, 0x9]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r1, 0xc5, "70c74fa86c7e492eac97c52455bed4a9f7f22ccad5ba0b76c95eb32dcaf20a7f17507f6e2a46e9fa8895d5adb26d6206eb65baca6b3cca030ca91d8c26e8cebfad6943a31dbf01c0c5b0decb4d5214339f2f0bee48ed062dd570ea4e1324f9db103529e7032dc58630a6bab6783b9e4ae03758b5b02bf90fbd7837cf6f7f826ef1cc62d679d7cbfd19d4063f88860501d904fae5c125e9ce5eea9c5b1dba8177da41f3b051680be9bb353b28cee3337b45a356ee01f0426e8b93954e355114efad81bc12da"}, &(0x7f00000002c0)=0xcd) 05:14:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x800000000000000}, 0x0) 05:14:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x820e0000) 05:14:02 executing program 1: r0 = socket$inet6(0xa, 0xb, 0x3) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) 05:14:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x8dffffff00000000}, 0x0) 05:14:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x5, 0x4) 05:14:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6) 05:14:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x10000000}, 0x0) 05:14:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x10040, 0x0) 05:14:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0xf0ffffff00000000}, 0x0) 05:14:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4c) 05:14:03 executing program 1: r0 = socket$inet6(0xa, 0xfffffffffffffffd, 0x24) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x4, 0x8, 0x9, 0x13}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES16=0x0]], 0x1) 05:14:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x10}, 0x0) 05:14:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) accept4$inet6(r0, &(0x7f00000002c0), &(0x7f0000000300)=0x1c, 0x800) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r1, r2, r3}, 0xc) r4 = semget(0x1, 0x1, 0x8) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000280)=[0x2, 0xfffffffffffffffc]) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xa) 05:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0xfffffff0}, 0x0) [ 280.160288] EXT4-fs: 13 callbacks suppressed [ 280.160303] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)=0xffffffffffffff0b) 05:14:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 280.293079] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x8dffffff}, 0x0) 05:14:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x97ffffff00000000) 05:14:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x52, &(0x7f0000000340)=0xf0b5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0xff, 0x0, &(0x7f0000000280)) r1 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/104, &(0x7f00000002c0)=0x68) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000300)="770e9ba51cdbeefaeb95d4e505497047", 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) 05:14:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6c, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0xffffff7f}, 0x0) 05:14:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) [ 280.713617] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x8}, 0x0) 05:14:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x200000000000) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x3, 0x0, &(0x7f00000000c0)) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@fragment={0x2b, 0x0, 0xe7, 0x80000000, 0x0, 0x2548ba42, 0x68}, 0x8) recvfrom$inet6(r0, &(0x7f0000000000)=""/127, 0x7f, 0x2101, &(0x7f0000000100)={0xa, 0x4e21, 0x80000000, @mcast1, 0x8000}, 0x1c) [ 280.847503] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7400) 05:14:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x8000000}, 0x0) 05:14:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000000c0)) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0x3) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000280)={0x3, 0x0, &(0x7f00000002c0)}) accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x8578d2832ab9812e) memfd_create(&(0x7f0000000240)='$%@em0vmnet1\x00', 0x3) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@loopback, @remote, @remote, 0x1, 0x1, 0xdb3b, 0x400, 0x5, 0x20000, r2}) 05:14:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 281.363223] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x1000000000000000}, 0x0) 05:14:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000000c0)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7400000000000000) [ 281.452109] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x8dffffff}, 0x0) 05:14:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="ce3f7ba348a6b78f16431e2fdab5422e6d168a34ed9d8988fa1ea8380c95709a8df58725f1128b44a96600f59ebbfc84cf3bb04671fd71a5860985429ceb39a026ec2f5806ffcb5ca7819fb8a34bb251ad428b5f290c79645df4864f504c57138d6d7eabbed590878bc1378a9e55ef66fd3549d921de0615895e9d4ba1f4ef19e409be3993697948445dd500c982b58b6d2cbea7678e8889d30dc1", 0x9b, 0x4000000, &(0x7f0000000040)={0xa, 0x4e20, 0x100000001, @dev={0xfe, 0x80, [], 0x17}, 0x7ff}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 281.821097] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0xc) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f00000004c0)={0x14c, r2, 0x4, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3ff, 0x9, 0x200, 0x6}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 05:14:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0xffffff7f}, 0x0) 05:14:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x97ffffff) 05:14:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x10}, 0x0) 05:14:05 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x2) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xc2, "c321a184395db3e8e79a83018ea5363366f393c06eec21c4493de2ba866fe71753fb7f885374cfc5819528fbdf31bb5341c8346af00cfebab191f698e9bfd0672e6619dbc15e27fcb360850a79976dd59d9e19123ba27f0d628c4a9aeec61d8f2c078537f3c17407ffb02b83d91527d5eea2f7e2cc19e1df2ed49f94da60b1484bd73dfecbcbe81455e9f1ef6c070782f8c33d922f35df5b22ef671bde9654ecec90e1bce3873aafa053f5b74f4d22597a2c6c0078f35650806a24369330f84847a0"}, &(0x7f0000000200)=0xca) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r1, 0x1e}, 0x8) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x80000, 0x8001) [ 282.298402] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0xffffff8d}, 0x0) 05:14:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6c000000) 05:14:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 282.674636] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x1000000000000000}, 0x0) 05:14:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x74000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x1) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 05:14:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6800) 05:14:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 283.117798] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) flistxattr(r0, &(0x7f00000000c0)=""/79, 0x3f6) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 05:14:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7a00000000000000) 05:14:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xb3, "9a844287c9a31fba012bc4fac52d0aede121fe9ef326e2c932bc1a9f176d6719d78d7fd704cbf68094d345d939d2ef427e7f4e16c566639478255627d4faa9379a2e468825c7b56c4769b985bc64eca1c2daba94edfd6aeac752e54f4db6a70d2a0abb2d90abb0285dbe8aa7163d375e77395f292ac90d612ec6d40c672c67f734165230b0f26982d2c97f5779e2b0da65ad767b57a9a0f2f7b3717e78664a00a32276aee0e2d55cbaae70c315e6836c615399"}, &(0x7f0000000040)=0xbb) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x7fa942c5, 0x8, 0xa5b}, &(0x7f00000001c0)=0x10) 05:14:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x800000000000000}, 0x0) 05:14:07 executing program 1: r0 = socket$inet6(0xa, 0x20009, 0x80000001) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)=0xfd68) 05:14:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x500, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x10000000}, 0x0) 05:14:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x5000000) 05:14:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1e, &(0x7f00000000c0)="9a7095a401358650c789f8e5839b0301ad8b60f8a7e25d3582341d0da5b4f3bcf17e5d7afac3639dcc46b4d0bcc2ec0ce1aa1ffe302de47cadbfe51cded8f687655b8a558f2a92214f66a66730adc2d09ec0f50aecc24f575e4ff5e9", 0x5c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e21, 0xfff, @loopback, 0x9}, {0xa, 0x4e23, 0xffffffff80000001, @empty, 0x6}, 0x6, [0x5, 0x1ff, 0xfffffffffffffffa, 0x80, 0xb34, 0x5, 0x9, 0x4]}, 0x5c) 05:14:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x8dffffff00000000}, 0x0) 05:14:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x872) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x101300) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x7, 0x4) 05:14:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x10000000) 05:14:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4c00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x8000000}, 0x0) 05:14:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xf, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6c) 05:14:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:08 executing program 1: r0 = getpgid(0xffffffffffffffff) waitid(0x1, r0, &(0x7f00000000c0), 0x80000009, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0xf0ffffff}, 0x0) 05:14:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x8}, 0x0) 05:14:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x74, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x68) 05:14:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000140)={r2, 0x8}) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x20, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8dffffff00000000}, 0x0) 05:14:08 executing program 1: r0 = socket$inet6(0xa, 0xfffffffffffffffd, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) [ 285.187329] EXT4-fs: 8 callbacks suppressed [ 285.187344] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7a) 05:14:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 05:14:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) [ 285.588461] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:08 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xf80, 0x40) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x4, 0x4) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x49ec, 0x0, 0x5, 0x8e4, 0x3, 0xe6, 0x4, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r2, 0x5b, "63cde3469bc0a5163d86259a0154f96031c8015cae00310ee391bdfb04da1f8771e34d3901fb298d48d9cad864a4ed48bc668972cf9ccbd2aaa7dca702e37b482a4cc6762cc7a7dfa87f66ef42ae57a4c621bffb3eee5d4a88ba75"}, &(0x7f0000000200)=0x63) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 05:14:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4) 05:14:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xffffff8d}, 0x0) [ 285.978075] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x4, 0x0, &(0x7f0000000000)=0xfffffffffffffe68) r1 = dup2(r0, r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) getpgid(r2) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x4, 0x200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000240)=0x2, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="88000100", @ANYRES16=r3, @ANYBLOB="01002cbd7000fcdbdf25090000000c00020008000200050000005000070008000100800000000c00030009000000000000000c00030000000000000000000800020002ffffff0c00030002000000000000000c00030008000000000000000c0003000400000000000000100005000c000200080001001f0000000800050004000200"], 0x88}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 05:14:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 05:14:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x5000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x700000000000000) 05:14:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) 05:14:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x5fc1f59, 0xffff, 0x3, 0x5, 0x80, 0x5, 0x5730, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x8, 0x7fffffff, 0x5, 0x4, 0x10001}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x6, 0xe657, 0x20}, &(0x7f00000001c0)=0x10) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)=0xffffffffffffff14) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x80102, 0x0) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000340)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x41) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000240)) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+'}, 0x28, 0x1) [ 286.497287] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 05:14:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x40000000000000) 05:14:10 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x5a95}, 0x2) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) [ 286.948435] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7a00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 05:14:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xa00) 05:14:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 287.252855] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x4) [ 287.362903] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8dffffff}, 0x0) 05:14:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6000000) 05:14:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x5, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0xa8) socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@remote, @mcast1, @local, 0x6, 0x800, 0x8, 0x100, 0x80000000, 0x200, r1}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x2ab) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x8500) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000140), &(0x7f0000000280)=0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f00000002c0)) socket$inet6(0xa, 0xb, 0x20) 05:14:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 05:14:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 05:14:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r1, r2, r3}, 0xc) openat$cgroup_subtree(r0, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 287.829794] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x300000000000000) 05:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8}, 0x0) [ 287.918472] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:11 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001740)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x40, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x90}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc1}]}]}, 0x40}}, 0x8004) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f00000000c0)={0xc0000000, "8c60c1c62a21795cb875da3e2a6309e2bbbf09c950a43bcc4b393d776a141d35", 0x2, 0x1}) 05:14:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) 05:14:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xfeffffff) [ 288.257605] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 05:14:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@empty, 0x31, r1}) 05:14:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r1, 0x5, &(0x7f00000000c0)=[&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil], &(0x7f0000000100)=[0x4, 0x1, 0x5], &(0x7f0000000140)=[0x0], 0x0) 05:14:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x3f00) 05:14:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x6c00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:12 executing program 1: r0 = socket$inet6(0xa, 0x400000001, 0x8001) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000000c0)=0xf0b7, 0x4) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000140)={{0xa, 0x5, 0x6, 0xd1a, '\x00', 0x200}, 0x1, [0x200, 0x405, 0x7, 0x4, 0x1d, 0x9, 0xfffffffffffffffc, 0xfffffffffffffffa, 0x1000, 0x9, 0x7b6a5722, 0x1, 0x7fffffff, 0x5, 0x4, 0x1000, 0x7, 0x4aa, 0x3ff, 0x9cc, 0x2, 0x7fff, 0x200, 0x101, 0x7, 0x3, 0x7, 0x0, 0x4, 0x80000001, 0x5, 0x101, 0x2, 0x1, 0x200000000000000, 0x9, 0x20, 0x0, 0x9, 0x8b46, 0x7, 0x597a, 0x1, 0x9, 0x6, 0xdce, 0x3, 0x9, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0x4, 0x10000, 0x6, 0x401, 0x7fffffff, 0x181, 0xfffffffffffffffa, 0x6, 0x1, 0x7, 0x0, 0x0, 0xf6b7, 0x100000001, 0xffffffffffff0000, 0xffff, 0x40, 0x3, 0x5, 0x0, 0xe261, 0x9, 0x100, 0x1, 0x0, 0x9, 0x100000001, 0x0, 0x5, 0x7fff800000000000, 0x3f, 0x4, 0x1, 0x4000000000000000, 0x401, 0xcc2, 0x5, 0x3, 0xfffffffffffffffd, 0x200, 0x8, 0x68, 0x40, 0x7, 0x8, 0x4, 0x1, 0x9, 0x401, 0x101, 0xfffffffffffffff7, 0x4, 0x3, 0x401, 0x4, 0x2, 0x7, 0x5, 0x20, 0x4, 0x2, 0x80000000, 0x7fff, 0x4, 0x52049738, 0xfff, 0x9, 0x1ff, 0x3, 0xfffffffffffffffe, 0x1, 0x100000001, 0x7ff, 0x800, 0x100, 0x56], {r2, r3+10000000}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xffff8000) 05:14:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000040)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in=@multicast1, 0x4e23, 0x9, 0x4e20, 0x2, 0x2, 0x80, 0x20, 0x84, r1, r2}, {0x0, 0x939, 0x6, 0x3, 0x81, 0x8, 0x1f, 0x1}, {0x22c, 0xfffffffffffffffc, 0x68, 0x40}, 0x1ff, 0x6e6bb1, 0x1, 0x1, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1e}, 0x4d5, 0xff}, 0x2, @in6=@loopback, 0x0, 0x2, 0x1, 0x51, 0x3, 0x4ce, 0xe9d}}, 0xe8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={0x0, 0xfffffffffffffc01, 0x9, 0x7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={r3}, &(0x7f0000000340)=0x8) fallocate(r0, 0x0, 0x9c11, 0x43) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7400, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r1 = creat(&(0x7f0000003ec0)='./file0\x00', 0x8) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003f80)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x2000, 0x1}) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000003f00)) sendmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="ef342aefa2140c9c02c68c9cd74de5f0a162fdc347422adb2bb98a1ebf34fea28bdfdec3e60269ed7f21b95cef2db5c7b3c96cbd494e35f467d2e6", 0x3b}], 0x1, &(0x7f0000000100)=[{0xd8, 0x11b, 0x5, "5803984254a3b6af0634f2cb62c2dd9f9519a6ea1957fa92d2d2b8cc37d4943633640a198c9c0cc90838abca58f3313074f61360676b15c25b7347e0361bd272fe7f7b687e0d0bdf284fc42d4aee7a9e91f61a40dca6899c26ec83286c8b0e354959e9c75047a435e3f2802c51397248c258fde8bf2e84480d5deff46310747003d1ec9e193ec0eabcd2dfc553b5ba56e5d9a20e06f1653afb741efb4053337054590c42a475cb51be1235950fef6bb3a640c0321f295b2e5884e64cd0bf34c37b2690d74f7baa37"}, {0xc0, 0x116, 0x2, "7b36f1ed9df57dc4fe8b745c795acea2f828af40d2a38f35ff4530cfcf27a8e0007f1e57ca0df53f208ea6709567c223c670baff1b7f54c6b2511bee82494836616a224005880e029feec455782a1220082a6362660da050586f5ac2d0705568376614622d7ab1e279147e97a1e291a2139b610f9043f2b92da57cdd4e02adfcf0e432c242ffd121b5ba1d604247c342cc291901229459396cae251564ab4451e4e9dec237996e90e35b8c75ae"}], 0x198}, 0x100000000}, {{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)="7b9c9216ee5368db6374309331884f99", 0x10}, {&(0x7f0000000380)="29e9085acc961c9a3b690ae575ea1c65a83af959496d71a250ce513667aa324a3f4c3621a1822ed4173715ee3dbc492e", 0x30}], 0x2, &(0x7f0000000400)=[{0xf0, 0x101, 0x4, "3724faa74f04ba1b081834815bf0e6d6a52840391db4011ff1e1c3079d8e5546fdf414a614eaaf91fe814e8608824e5fb6a4e4efbd936163b418a78b59962d2702cd1f034ccb39decba74e74375f11c3930941264d10093ed790141fc09d0b2fea2f811f76c8e7d7e1e6640d4bb8356f69ab2a26e8e57236ffb84536529bf050939be2c976f29c837797bdf65bedad5c2424acd3f44c257040435c48c9b55ede81f6a7cb6f4438e8d68cbceaa46fb57680cef8a7e0a2d8e4118995c2a8a686b0f41b5bc5e2da1c9d5655010526ad7264f622cacc1dad1274e5da"}, {0x68, 0x1, 0x0, "29674b92bbb534fb4db61065ecf33fa82f41993115f231a604d62e2dfda6060151c328da1742d6453e8607cb9d5ff61b6dfffa6e3c8989da68338a4c7079fe4c534a100f5d946a475dc0756f58236d2afa367f513244c9ac"}, {0xc0, 0x0, 0x8, "d00a417b6ac1e207126419ef6b158011c9c4522721a843da573972d3dce4b5820f4f6ea75f3cc8a19e8b4e42fa8e15b6e9757d517cccd06e7ea52968c7aa7baf97c351ee3b8e7e89fc5b72d4a06ad878928a47cd10e8087cf5d8bf868aba7445a594cb0313cc9e32edc4f2e423217c52be4d676d2d9f7b468251d78f5f3c999acf7d61eed8976fa5976be3b75d5a960390d6bbb69849c969799b7ef7455f25571ac09afb3e78ab45091a39ef51b96e"}, {0x80, 0x10f, 0x100, "47b1594e375624f8bcf53f1d4fd8ebe7a9ca90bcf554ba9e8c4e48d507cd8e1f3571cd89df23c8cb918bd6c4f2e54da87469d6213946ad937e8100e53898932820a1a363ba601bd8017f075c01c188975a248f4fcd20d32ef632e70638e4e149891397ba193a2dd2dc87a87d992ab1fd"}, {0xb0, 0x116, 0x4f9, "8063e90e78c547e7f7cbd7854e1fcd344a0e58853edc124cdcf9799525abb0ff2892d7ed3611565d3296424847193f89e200acd7ca7d837d25df23d46aa962d8f373039aea6329a034cc7b7957b1b5ecfd02b547220cd1cf36a6252a3360f52b07c580d44d3286086e79acf33676c69dc02acb39ab4bc85b04f643082d09248b11e0bac1fea6d1e24e94f30e804080e23f3f593af00f3b368251b8e8"}, {0x90, 0x13f, 0xfffffffffffffff9, "328442003dea36f198aea55ef1cbe823407ac395682e4aa091404f33b5fb32efa9f81413e14b92fbfa4deef4b0ad60d8f0b694002a91a09048ae4639082c45bfebace6e809b32819359c0e651083e6ccb4fd6ddab1594ee3c8b15fc59cf65a8b9356f5a3d01309af44981a3b95841fa8bda89526dda3340ee7"}, {0xa8, 0x10a, 0x7f, "a858ff00d5a984543f85229f53b15dbee5625adaccf224841beb750834b01bee021950d4d9a7f1b1984ce7d656de54c4ac30f6b9cf22be7135a3b330bb68ffa830584ddfbdced67e61b5702c4e85244be53f7e50e0935f17c3e23a1acd166f34023714bcf438507c346e55039158729e7cf2d5c08d9c255ae9288d5c426c976160257627e7aec78cd71dd9fd15b07c875f634251"}], 0x480}, 0x7}, {{&(0x7f0000000880)=@llc={0x1a, 0x317, 0x5e, 0x9, 0x100, 0xd0, @local}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000900)="25bd1fe55b2fd5fd8e0f10f9d3df211db471e8d7f0e4c727e52a03683475296644fceaa0fb7746335faad48fedb3b3f798078a742588461821989646a73f18cc2576abc3083dde85ae4df3407d8199dd864ec2922cd2b2302cd1d8afd39cb5656ab97e1afcdcfd24d381e5095ca5b41404fd7bde98bbd173c936e66cb50ba0ec", 0x80}, {&(0x7f0000000980)="0d0805ac1c37065a4f642fe3fbd795666aa43cf06418c6a9cfafb53086d123b0bd02cd057382ec2d8b9cf3c18a72cfed9b3e5c2804ccf58b200aef8f5a27e69effa690c3434a851c88838749311836ad58fd30552774800d939f9ad5db47c10bae0aadb629ecec04a6357d4e5a24d64d7de839b1fe3bc8c48085789f3003a95228ddee7608fb15d7d60f2bc39f10975430d86c246351fe92892c5721225b9fa8da709e8a2519b01326a9ae38becf72468a323bc77ae85bddc438e6c8c6d8e499866e72763ac9cff86f365dd418f6b6163c0cb683178edb92b32c296781e63a76dbc8c9e11840b0b7a564", 0xea}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="9fc32092ea11897cceeba0b5f32e93961d663917e9546cf0fe50c7ff902265169c078a3e055b853205875394a5db5c12d656f9599ff74acbf97434edc0e8320b304124fc26", 0x45}, {&(0x7f0000001b00)="569a1b8d25fe", 0x6}], 0x5, &(0x7f0000001bc0)=[{0x1010, 0xff, 0x6, "6a648fc11ea9c0046298985bac96de992e949edf74abbf3bef3128c60840644680cacf2c57fe18e1a61f6d4b25680d45e7974e4882e4e28ea3ad7b04740742b961f069fd2af2af0a8427733cd718272df386a0e6cfc8f25e5dc32adf3cde6590225f3b71b914726234f07133863839ef5aae6bc2f29fbb05badd6672d3b9916bc0025c3bae4bb39e1f912f7c481f828a9fbd976b2e46d1d66d0e4768061403a88425bcc5a87a3644cb6a0353c61a17592c94676e9a49abb2e420ff93ec4bead08fd7b2dd7d709fcae991f7122d265646af88bc9afea2896380e43ebbab238bf18460eeb4feeba865851d3e7f98a8e6196e839dda0e2fb8d917c4c06467bb93ce9f09e3abb3d05694b24b7ea02aaa186a97ff41e55c1a3a6ed28867c01e4962168534d3fc16cb2b6b70ae3b2588745221bd06c19e83703f1b1cc59aa5701fa9415ad25be0900ce637a9f408920ab548a9aa77d1a99c1a1d55f00bcf4e41440e38591794cc8e3b74c749c977feaff71fa8ec9461d03d03c2b8b7381de04a43f8554254be5711877995b7bba1b7300d9506e32de252f071ec348eacac1469c7942edea6e575a50bc0d84114a6d0aee998ea9bbdc6d09d1c916527c64e212206174ab9b64b14f0a2e67dd5469816ba95ce8444d7383841772e9143f4f033b67be7af094cb2891355e0e64ff3ef6a20bc6d571306c6ac52d811ea472e255ac0cd14166ed063501fadf3d96b02d54ae035a6338493387642d1378fac9b9feb9129fbe06a2721a6fbf821c5acd7e3ecf223d1b6ab2b0f300eec2225c410a586f082e8870e7deef3a9b3b1631842932babc6b9c4ce80d17a69f6e21138f74a9ae690c3b30e3939f0535c1e7fed89667be420de3dcdf7f708784e7764f9728f7f3f133ea073bcc1b8ce55e468d7258443485788dfed909d413cf3161d4233bf16be72c6f7f64d2a0d45a07c715c01e9832d91f587b47e8cb53e976a1e9c6bf4e3ae147abb4ad72f7fe50f7ec65599fad55a5cf572f825793eb4aca8a15b3cb96ccf4b018f86a112e784f5154d23727139523905876da0b7e1d0e52c4ef5965bf67f2465f27dcfcc6f27881cdc544a82ec75d72641aad63ffe9aca5fd7fa6b95c295cb06360a3771b6e7e19c2121a3adcd11e76fab6827c21f48855ca1a9eb938f107e1456179ae00d1cb651a742038f3e2fd79b560aab57fc22628cc927d8a6fae73e9559ceb12b844bbf8a955db7987545fffb5ab24f1f950a8ecaf007554a84c546376471a0f40dd4a3b9e712349718f39135fba6345a44290d70002e72caf462f198e3b248702d4e222bbf114bc5c9cb071b706ec7f7c72862f66d7c2b502ac83bc94e9f484b1bf1b35fb4e7146aa3dacebd664faba86c83a7c735ff7379451852b237c6b77c8ac52d41605cfcf4ea796551e5bd69f403587129a3facf87da01e767e42e52165dec90be6d639b670adf180f00af439f6a8bb9ee43a3a36ca5f28c21e0f8f6ea30a18047351e92815058644f4a0e4270b22d1672df1612d76448f99678f71bb1d675296bac949955b44c7ed6275cdd4732e52da199d6675d4f0b43ed0a276efc77aa153bf8cbfd2387308e7219ec06286d56834f3730fda2299e41df6582d4f61a8e2c5377c8eb423ca896fde29080d102f9f6c97df8b8bb889adb184379952704f7da718943c19d76ba1bb6676383c3d924303463b75ce6ac598eba29aaa7b84b2447e2e3f6e3a6344ba77896469651c369681758267693a9b7196f3022106476c167109e5a83b6c29ca0329fc764f8b97ddb4a83931b12b25c405c4733e77739a3d5e285a5e353b46cf66f1c62bb0754f557ae5bd9577e161f5ad359d8dfc38479097f44dd9e78c601e7ff190671349fdc4922a272d8ff519b5af4d6ec2029f4a843649652874b299d4e810419affc81bba2786042f08fd5d8b17053f6294d6ebb010af6e45954d326328597e0676c97410aed356361c0b95236c47c515dbd104ff2a471dadecab3100eec478d44f43f9febcdfd625c7b53bbbcec147d708dedb94a9e0b8087f7ea5f353223efd1924a6684a49861eabc84b54f7585188f080f99afc6921a4fd12bab54e96d79c93dc3d9ef37ea3940686c7a820ce9373aa42567234f2a8dbe8f873bec1515647d558d8432683e11257718b43584e4e8389146dba89b5cce59e5deba78b1cb0f2baf9f9c99435fb0f60e1bef35450e65add7f908540b966f44fb59e5dcc02205804b462c413e7eb757e39119b31fc6d082fbfacd1ea97e9f66c278b7ec40b13fe0248265d1e75e65d9624c100532af562f0ce9127a10dbfcaafa6fede7b220979693d827a945ad9950fe466048137d8dcb970d1889400bc8e5b1191da281d2bfc110eb26c2d1bb83b14213ada786e3623e1a69690b976296b711c7d191e349f2c4a3731a5ae47573ded7032e4c3f5991ec483c5fa27c6f968471ec122769618c41fd5e92e8e6f78fbc78706d8aba6b416fe4ccef2c6600d67b7d100278649c6a083d9d1b30a047e34946296353308eab8b814c68f5bbac00ae9b32346a9ce867ac11b677100c52b8b4053f6c75a25b72c776d3e67f7d3943572a59c368cc8ca5b67041611fad320c03eeb272540ce33369f70dae3ce099016e197f324b53e62ac93c79d617a23d9ab2191fb813337399b71ac75848578d41b88dce438021956a5e840140c0d5e9337ac019c9c0408aff5b1b0de1a6ed234b1217002e5f6119eec26a74573a2cb2e3c7374d7312786df3e9b6b92e8a582342cfdbe0612eac9f935fc0d60ce16cda52258de97941e4da723f325e742450c8cec8b2fe36b3e420c0fd838a474dd8e0d1563ec422d7a3bbbf49524d503759c0d55970897e59d248b035ae83b7bc29c85d51ce38cdef8ce10df7f6f7e8ba3c21cfda34a65e95771f603dd6e7d00c8e1d96bc335082a9f0b5776fbbab653da227a18ae0b19456e21c24b08a4fc31e69b77aabc3a5dbd05103c649dbd864b04a3af09b8b299f886a716088f77c40177af1bf7887cdb5b6303c1fbc0f1822717471977f90d3986adf439f4856b6619ba7088350d47d04888f864242578c564b57442e2ed4a5f68ae3450b4ba2474e2024a57a2ea330b44e25329ceabc379200b8cb18a640ee39b3c3b84d176c1b8b16e9befca41bece694dd02cf9f48d2501cbd68844d957ad12b627c7006175a08bad2ea18cd0f1246493072eb580b9b138758a0c5836f5b66a3aa637cd034780f22f2dd72186d1d31053d3486cb9f178f4f1fbf806e19a0c9b0397ea6b06a1152cc2fb0ffa7de62f39eef080ca97a35894d7c24a207a84678eb0b7cf775ce4e934b3431e41afa4d3b4fc2238b087c7a7c291f3f32f8bcc61d406cbc0c04e7f70804f82d8437c5ee7dcf1715fde2d55f71fcc37ba05babbc38529e98e8317287282ec42c259cbefd483ac5510b151c3d35dfd5ea5fada998e5d014343db383b8ac037d64471ce146fa026d16af025851832fba261394aed67b07354ffbd863934f353e527e31c5f9026d275c7067dfc464e2a32b778a725f6c0729486154a188932606f0e244675e3b12b662d78b13f901f6dd1efc2fcd3d72a8621f3455cc62d640393c68fdd0e36edf109e4c32896303674535ac4ef9ce4cdda4d09347a1abf9fb2a72e50d5893e2ae8bacbed90fdf35a295fe78b2a51416d7bfb0068f33c183622d4e7be0ccca1e1ca6cbc549c21f85ed0c0a8b54a378a70d9772593a8c3436a5f17c91013189b6a9227ab302fbd0b24425c807b8dd2484f4ef7753d3c9a66c00195937d4ac2d6628081608a3dcd7c4cb5666b6064e52532b56ea029665df5c9f9650962353856837d4db7e188be769f63e6e00d24680ce6473ce9fa67e9868fe20799f9a61648cac43540c0bf08505c3a6d5d20e055d63e1b0c6a5c71e41600ceb277b4b0777e7fb8e6c8ab9e0f7d3ea6a341fb6ea5de91f58c1ad7ad3621a269b584da060818c98dafe09f18d5f638e0c52e2a8eb0a9631985eb6b84e1479ec2542d9c83adf632ae07470db19f2c8b663aebf7b8829be442bfbb2d633179a088dadcb87c4eb5d464aaa08112b4748db02f3d1eb3c326ec97f239cfac2d14178ca7f22f872d47ee4421e3df8511c84566571ebaba1fb3aef28c82a1e134d9de1f5256fe51ad0c374fcfc20ce0953f3e825bc61df1b241971a5ff8cd6f16f23f9fd3a80b15489a1154ee2f37f10e1087bdec94952ea70c5d5f3e1df661094eb6224c2a5c5c1c350e57a70b17406f0942c79c0d44a569ab62b442c857e9219b4c9f0cb72900c4e982833bbdbc104532036f64bd524e4ed47fc30cb200e728dfa514eb25100fde460573507c406cb5791d44cafecfb76dc89c1e7d6d76c84dc94a1e18a84a8a1ed77be8e08c6967db3f71d189ccc4c27a7e68c7241c81164ac18cea746f327dac33b75a70287c6cf350d77268add98c53794c0657f00d574018782186bf0a2ceaa127f67cb56255ec53987ad76cd1bc7beb223b5d665dfa44a17aec84b7f433e83a9c59be7a139fe49f032e06dd715fa30a88224038b538f8cb62137a19c2daa3940bf3d6b484ef5775d2f03898e242afb973988a81c80b34787faf870cb7adca01ae74fa7e3db36c2d9112a2c7a83e946b8405dcd447b1a72f1ae86b1958177bcc3be424ccf615657e40a30a7d2c0e35f79ef13355141a161f2b7868d6e28aa4d241cd7afe4acf5dc8339bf4e859781cc49d426d5ae429f3456b14eeb4a4e600388cd15f3e1c7f289a03a76b3998a0605ce288434d0e4d7debfe24493e8d4c30ea375f9fdfba90837968303c6fdde84c3e29437547d5a28ea5ba9d0732b3e1a51cf6ebf6f708e35d79093d4fb13dcac64dcabde1e84a53ad8b25fc9873e08fa2be8929725b27ed16c017a5c88c6076dfdc8d4c04ebdd55198527ddfabf49c005777f22d2d14b79ad867b915088cd9601903bfe3d9650a2036f027af268201f9a8e0d957c6a16e9c389ded6ce41b6c75169043b079c5f728d3a4ce379a129554acbab53c7d9c4dcf0e5b166ae790b0a5902e68bdcf22c1d17950e145b05826498575c8d206b46222aaddd180cfe059996f2218fdb715f440e03ea7fc6513475bd2b2c345d749b4333460d0722336a0e9172fccf99b7274e0a7539106e844a5d89e2e02e460f5d538f814b62d19b8cdc10b0ad340190b6d360388e53654c7fac2e41a189bfb5b48b1b9bfa758bc6fa21aa312b74596dbf56bca79721d59a3b5ca24236bb4a4b4015832f6cafc96d466b0e1b85bd35f36162bea3ba9c050afa0cba9726fd747148d0a5e107908bd44b9d39417dd712d0289b9215a802406ab5a8473986a8b3affc4d05abd9e9e7d4249c0abcb95b0bca545b8b3e66639ec285af01fdb2c2a52b3c4411905843b0faf0cc6fd2fdfb8c8d12bd9852f92b807153be9e5506cd4061d18392fa9546ad4d58222e1befe70ee8668a9aaa4d5424c4abcfab35772bfe0924cb71af269d377e8fd8d13130f918952632724e2e68108a4ad5dacd67219c8fdc8cbc5b28338d9a92804518e413735a197362ab09a439c42621ae627e28324c6014aba3c4833bbec48c70cb840ed4a3efa7c076b0d93a20bd0a5a27128ab265ece7f0b05f026b6e3aabb994ca79f84888cdf17143a5ee56b98745356b159cf093f4ec16d3e6fbe2e3464ae3daac455a23c776608e0ec33fb5e0ba303d74ce2bb386149b52f7b38e258bf601f76890fdf3a9c82ba8725dc853d75a83d62ba623b77b2ba2d43ee00f39558b9f49c7ae728045c9497e53030acb0633eef5c0ccd"}, {0x1010, 0x115, 0x10001, "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"}, {0x50, 0x29, 0x0, "d5bbaf8290c63c9c449de6d04f367a3135bf3d07171ea03489c4201a872afcd6a924899107016796739cc243a939d64a25c7d59e5201d64b2b001cd1"}, {0x28, 0x119, 0x2, "1212043855dad0ac8471a03a5a27240d0f27"}, {0x68, 0x10f, 0x2, "c876469c82fd78bdf5efea2717f4e1ef14b183365b6e5b94ba50229efa4d85449620fa199a4a08142c14f39bd0b566734e18918665d5cc7225d9bf247a9bc832800b74078497d16b5d6cc78f85981c68cf4e32db"}, {0x108, 0x11f, 0xffffffff, "daeb20040d6e5c08f92169885304851375909fde6e211b828a7cb01e166db9f0a44acdaa109114bd7145ee9e4001bf2d463992942847d4eede27ec24b0cf4f54975fe47300f6736320666ca8e1623254ff3517549dd61777c78c2ce4fbdf5e206d86bbd0298f7ed94a9b0d3c751d39cbad216e1213240b4505191ee404efa66b71620c64da87a83715bf4a233809cff3100653ce20a2641b810f21b754add4a3d9adb57b989f2b31d47bbe6cda9132d9f28f62c773474953569e00459ba4f9ae945e7e81aba6cc8599aa5d8abdc4c4225c64a991dcd4b68341b6568edf0a808a535c2834add622a7dd596669cb1b40bd2532c973ec02"}], 0x2208}, 0x1}], 0x3, 0x8000) io_setup(0x0, &(0x7f0000003f40)=0x0) io_destroy(r2) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xe82) 05:14:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000)=0x55, 0x4) 05:14:13 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) pwritev(0xffffffffffffffff, &(0x7f0000002400)=[{&(0x7f00000023c0)}], 0x1, 0x0) semget$private(0x0, 0x4, 0x400000000000020) rt_sigtimedwait(&(0x7f0000002480)={0xdbf}, &(0x7f00000024c0), &(0x7f0000002580), 0x8) 05:14:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4000) 05:14:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x10000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f454c4600010000000000000000000000003e000000000000000000380000000000153eac97fa0e331cdce1074caf58440000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008e519901d693e390c2849abe6b14901a84289395a7196030fff7de511ccc5ca776ea0000af6313836d11f153dbdce844c037d1e369823e4f636d2df139a6c59c22a869e8bd3f509f64fece575ec56bc4c27ff2332b4bacd980500a913659920c86fb44a56bf19040000000000000000000000000005cb74e26a78691bdb598ebd56ba8ec43d720682c0cb95fd592bf78b89ad06ad52e86f4fbd326642cc979f8a127ce739a8fc63637842b1cea8d47155b1fe7fb0321821d7ddff463c66d0742284cd44d1bc871221c507b0052b6e2eefd32cc405e6d59aad5dd30f45b2ef4bd5b442a6af910de3aad5daca68629f36b6b05ce536d3db1d62ee8d5e38f48a2917c03cf1bf551d467907ba8524e488309f3465444b0c9faadaf073b52c14a7ae18620f65ca6def202785da26284b891d6483ad6b0c22e71899d744948caafafcc1d5c19a48411cbc3bf3c9083500a10c19753db23e7d5e29341f01dc85714d8d3c9efc9a9689445b1bf6afc3e6ca48efd59a8bd588b412f72c54546ee2c579e5649e2f66481b4cfb51334f03345dc67b828163b712dffc45878637016cbf66ab1da2b8273c09765b7e177b86716cebd88b75da5d9c36cc6be572361d0fb03e82b242e4e4124e4f0d6af8002f1c8d283945cfab27ab351e872f4e4cec83015f287747adf249749abf49f00380155077cec91c822307f859d8c7ddab90000"], 0x264) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x4, @mcast1, 0xfffffffffffffffe}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 05:14:13 executing program 1: r0 = socket$inet6(0xa, 0x200000008080a, 0x0) socket$pptp(0x18, 0x1, 0x2) getsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) 05:14:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 290.200232] EXT4-fs: 8 callbacks suppressed [ 290.200247] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x1f00000000000000) 05:14:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x820e000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x48) [ 290.531803] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x38) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000000c0)=r1) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100)={0x9, 0x3f, 0x8000, 0x5}, 0x8) 05:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:14 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$sock_bt(r0, 0x7d5904174cbda03b, &(0x7f0000000140)="d8342eac0322ba540e57b0f8aaae1b40501344ad73eaf864c0fa4ac4334365c79f5489cb8fb4fb3eb5052a9e1e9c1f9472fc6c609791e59e0e29e5702f981e39e7636a7e7c517315d9ad73ffccf8a0d4753bf6f0d3c68c38b13c0813580790de692ea3a3f6d2190ad921a0a3ce6edd192f24e2399653130e0ae5654eab7fc8706d2c7aa0d7b9fa7668050f99cb4602e8c7cc68b827c39741c1547c3279ffdd60091a8c72f13be799012e374756af9a162296fcf69c4884c7b6c1a4685c9244630746b4") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) accept4$nfc_llcp(r2, 0x0, &(0x7f00000000c0), 0x80000) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) [ 290.937150] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x68000000) 05:14:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 291.030040] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x264) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x4, @mcast1, 0xfffffffffffffffe}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 05:14:14 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x18}, 0x10) r0 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x9) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x40, 0x0, 0x3}, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+'}, 0x28, 0x2) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000001c0)={0x67, &(0x7f00000000c0)="1328bff2d95c2c257b395807f8d6476689280e34fd4d301fc448b2fbf22792bf3c1612fcec0bea56a0b7cd0ba54f7cd36f85978fb86f635ab1995e8fe20354d3e3c81673bb2106da53c37f00b770f7fcb651ca4189e060a9d54fbc38c2aeae1b71f24c62d3e45f"}) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x1) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000000)) 05:14:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x410000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x2, 0x3, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x9, 0x59c, 0x8f0, 0x200, 0x2, 0x0, 0x5, 0x10f8, 0x5, 0x6a, 0x2, 0x3ff, 0x80000001, 0x689c, 0x2, 0x6, 0x0, 0x800, 0x10001, 0x3, 0x3, 0x0, 0x5, 0x80000001, 0x2ae2, 0x7]}) 05:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xfdffffff) [ 291.432136] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x1000000000000, 0x0, &(0x7f00000000c0)) 05:14:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 291.552853] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:14 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x200000000000004) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0b7, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x2d, 0x0, &(0x7f00000000c0)=0x2ac) 05:14:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x68000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 291.856196] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x264) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x4, @mcast1, 0xfffffffffffffffe}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 05:14:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x600) 05:14:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x0}, 0x0) 05:14:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000340)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20008004) [ 292.001776] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1f00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x1000000000000000) 05:14:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4000000) 05:14:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, 0x0) 05:14:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x8dffffff00000000) [ 292.356580] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xf0ffffff) 05:14:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7000000) [ 292.464541] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 292.570366] loop3: p1 p2 p3 p4 < > 05:14:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 292.971062] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 292.994802] print_req_error: 550 callbacks suppressed [ 292.994812] print_req_error: I/O error, dev loop3, sector 301 [ 292.995009] print_req_error: I/O error, dev loop3, sector 101 [ 293.001789] print_req_error: I/O error, dev loop3, sector 201 [ 293.016400] print_req_error: I/O error, dev loop3, sector 301 [ 293.018076] buffer_io_error: 546 callbacks suppressed [ 293.018085] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 293.024028] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 293.029291] print_req_error: I/O error, dev loop3, sector 1 [ 293.049666] print_req_error: I/O error, dev loop3, sector 301 [ 293.055587] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 293.062990] print_req_error: I/O error, dev loop3, sector 101 05:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xffffff7f) 05:14:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xffffff7f) 05:14:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 293.068945] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 293.076271] print_req_error: I/O error, dev loop3, sector 105 [ 293.083111] Buffer I/O error on dev loop3p2, logical block 1, async page read [ 293.090505] print_req_error: I/O error, dev loop3, sector 301 [ 293.096409] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 293.096470] print_req_error: I/O error, dev loop3, sector 1 [ 293.118884] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 293.126237] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 293.133651] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 293.141040] Buffer I/O error on dev loop3p2, logical block 1, async page read 05:14:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, 0x0) 05:14:16 executing program 1: r0 = memfd_create(&(0x7f00000001c0)='b\n\x00\xc7/\xb1!\b(\xbfy\xfe\xfa\xc9\xd3v\xaaT\xb2\xa6\x02\xf1\x9c\x04|\x15\x8d\xb6sxqg\x00\xc0\xfc\xf3&\xe3f\x90\xcb1\x11\xfb\xfa\xdf\xe0p\x02\xe5\xbd0\x9e\x11\xad#\x17\xa5\xcf$R\xa2\xd8E\xc9\x88*\xd1{r\xca\x05\x00\x00\x00\x00\x00\x00\x00\xb0!\xf8WP\x98\\\xa0\x86\xccF\xca\xba\xa2\xae\x01#\xb0=\xecG\xfb\x00\x00\x80>\x00\xdd\xf2\x14\x12@-V\xed\xdaV\xa6\x03\xd5\xa6\x91L;\xe1\x97\xccO\xca\xf5\xccw\xa8\f\xa2\xa9p\xec\x16\xb1\x15:\xee\xcdc\xe4<\xad\xdd\xf8\v\xaf\'a_T\x98\xfd\x8d\x8d\x8e\xbf\xbfTF\xd7\x84\x8et\xeb\xbbBA\x8d\xb6 \x85\xee\xa7\x9f\xc5c)\xc2\x1a\xfb\x90\xf7\xef\x8el\n\xcf\x06\x86\xd9\xc1\xff\xc1\xd1\xc1<\x80\x17\xade\xcb\x14\xb8CkFt\v\xa3\x1d\x1b\xef\xe7A\xb0\xe4\x8bE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x4013, r0, 0x0) keyctl$update(0x2, 0x0, &(0x7f00000003c0)="c0", 0x1) 05:14:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6c00) 05:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x8) 05:14:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:16 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9208, 0x0) 05:14:16 executing program 2: clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x2, 0x5) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 05:14:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x10) [ 293.591869] audit: type=1400 audit(1545369256.900:53): avc: denied { map } for pid=12733 comm="syz-executor1" path=2F6D656D66643A620A202864656C6574656429 dev="tmpfs" ino=50702 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 05:14:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0x4d) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x2000003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 05:14:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x400000000000000) [ 293.796469] loop3: p1 p2 p3 p4 < > 05:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xf0ffffff00000000) 05:14:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000001ed01ffbfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000011d400500000000005504000001ed00002f040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) 05:14:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, 0x0) 05:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xffffff8d) 05:14:17 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 05:14:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:17 executing program 2: r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r0, &(0x7f0000000580)=""/129, 0x81) 05:14:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x820e000000000000) 05:14:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006001000000002000004e0000059d81458186fe8a000020001000000000000000002000000ff030005000000000002000000e00004000000000000de78fc"], 0x60}}, 0x0) 05:14:17 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getegid() link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 05:14:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x800000000000000) [ 294.479977] loop3: p1 p2 p3 p4 < > 05:14:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4c00000000000000) 05:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x10000000) 05:14:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xedc0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x8dffffff) 05:14:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x1000000000) [ 295.228616] EXT4-fs: 11 callbacks suppressed [ 295.228646] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x8000000) 05:14:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)}, 0x10) [ 295.323912] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:14:18 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 295.429849] audit: type=1400 audit(1545369258.740:54): avc: denied { map_create } for pid=12910 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 295.503078] audit: type=1400 audit(1545369258.780:55): avc: denied { map_read map_write } for pid=12910 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:14:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getegid() link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 05:14:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4800000000000000) 05:14:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 05:14:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xfffffff0) 05:14:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x74000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:19 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB, @ANYRES16=0x0], 0x20001982}}, 0x0) 05:14:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xffffff7f00000000) 05:14:19 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x1000000) 05:14:19 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000c40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000a40)={0x3, 0xffffffffffffff0d, 0xfa00, {{0xa, 0x4e21, 0x4000}, {0xa, 0x0, 0x81, @local}, 0xffffffffffffffff, 0xac1}}, 0x48) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280), 0x0) sendto(r2, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000000), &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000003c0)="2ec6ea2a1441fb2654b0ea86f608185520496b161602337b1166dbfbf9d69627d038ddfe7697852aa203eca69f78d9c8f436525c090b87d6cbe9dbe3dc81769e50ac12045f34efc4c799f4e1fc63a5a4ad1c75f3e20fa360b1cc839132853ffcb375ef9295cc6a57dbfb14bd71ceff2b0dc5baa9f026955078b5aaa89fe85833f6ba70cc92ccde2dfb3e210697f8", 0x8e) stat(&(0x7f0000000240)='./file1\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000940)=[r5, r6]) socket$inet(0x2, 0x1, 0x20000000084) dup3(r2, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000001c0)=0x1) getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0x105) 05:14:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getegid() link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 05:14:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x7fffd) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x7a000000) 05:14:20 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:20 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000c40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000a40)={0x3, 0xffffffffffffff0d, 0xfa00, {{0xa, 0x4e21, 0x4000}, {0xa, 0x0, 0x81, @local}, 0xffffffffffffffff, 0xac1}}, 0x48) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280), 0x0) sendto(r2, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000000), &(0x7f0000001fe8)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f}}, 0x20) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000003c0)="2ec6ea2a1441fb2654b0ea86f608185520496b161602337b1166dbfbf9d69627d038ddfe7697852aa203eca69f78d9c8f436525c090b87d6cbe9dbe3dc81769e50ac12045f34efc4c799f4e1fc63a5a4ad1c75f3e20fa360b1cc839132853ffcb375ef9295cc6a57dbfb14bd71ceff2b0dc5baa9f026955078b5aaa89fe85833f6ba70cc92ccde2dfb3e210697f8", 0x8e) stat(&(0x7f0000000240)='./file1\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000940)=[r5, r6]) socket$inet(0x2, 0x1, 0x20000000084) dup3(r2, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000001c0)=0x1) getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0x105) 05:14:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0xcb) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="950c1c497a15649c13a8cbf73f051b8cd6f3db67286eb8f7ea394345d074c82e126d273ebc564a914bd44052a3e7f5bb"], 0x1}}, 0x24008000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x2}}, {@cachetag={'cachetag', 0x3d, ':'}}, {@fscache='fscache'}], [{@seclabel='seclabel'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@context={'context', 0x3d, 'user_u'}}]}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="6143d38661"], 0x1}}, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 05:14:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:20 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0xa0000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x420, [0x0, 0x200002c0, 0x200004d0, 0x20000610], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x498) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) 05:14:20 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x820e) 05:14:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 297.042210] xt_AUDIT: Audit type out of range (valid range: 0..2) 05:14:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x800000000000004) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80800) bind$inet(r3, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000680)={{0x2, 0x4e24, @multicast1}, {0x1, @random="9f20ec5ca5b8"}, 0x40, {0x2, 0x4e22, @remote}, 'gre0\x00'}) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) r4 = accept4(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000480)=0x1e5, 0x320) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000640)=0x9, 0x8) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x40, 0x200003, 0x7ff}, 0x10) connect$llc(r2, &(0x7f0000000140)={0x1a, 0x300, 0x7, 0x9, 0xfffffffffffffffc, 0x3}, 0x10) 05:14:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0xfffffdda, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x2000) 05:14:20 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getegid() link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 05:14:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4800, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x6c00000000000000) 05:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x8b, @ipv4={[], [], @multicast1}, 0x10000}, 0x1c) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="35dfcc806e9f06cd00b46a5c4ee958498bf6bb801a5fba852ebcf0cc55"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xa000, 0x0) 05:14:21 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000080)=""/64) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:21 executing program 2: timer_create(0x0, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x3ff, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) write$selinux_load(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c0000000000002315c908e62da29864c1ab74e9589999e506d7a086132b59a541d4ae62ec08d80b1e55858e1124d656730000f948a0c046a7cfc9d4bd84cd58192a578f8f85704e755cf3e4a5bd8702aa2f72487459f015d0b148d69dac7400e4b077ca5335069e683364c6843a7a05568a4b9949556fd02d0fbc6eed815867f3eb714ad302ed83ab3e74fe7a6deee046d60b5becf4ed950d9676"], 0xbc) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80000004) timer_settime(0x0, 0xffffffffffffffff, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 05:14:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x200000000000000) 05:14:21 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) 05:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) chroot(&(0x7f0000000080)='./file0\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="b9dc5ec93e3689c780aaddc0e7780c5658f178f8b3d81de1054adf892579d5b42d99bd13d351b93cb6f1ee8ae357f9bb29fa4468"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2fa347b45d4b52aaa3df75f1d3ee0177c07b782f8404be58abc29fd5007c8c1eca040cadf76df4e96c121c98b8680feaea5f3562411de13dbec36d5126a2120a20007b94b10018033f64aa128a1955a0b7cf223d5511a84530d65cd53d1460c1d0d79ede9da39a6f22e1d64ff2fd271de2900a7ee32c34bb57eb1356ee2eb33968823b28b6258b5d545d407137f304e968f6620dbe75f9523959d5e5450e139d6ad4125b5e"], 0x1}, 0x1, 0x0, 0x0, 0x3}, 0x0) 05:14:21 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getegid() 05:14:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x1c, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x1}}, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) [ 298.636768] SELinux: failed to load policy 05:14:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x74000000) 05:14:22 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) 05:14:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9145a82092fd47c76baca2ae454b9631a945c74c09d2"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x80800) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendfile(r1, r0, &(0x7f0000000140), 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) tkill(r3, 0x1a) getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x287ffe, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f00000002c0)="2d7c317f405b0a6d46683d15fef21f334df68ac75506142a49989833fbfd9a112fcc2f5af479de8d18c6287a5883657b9fd71896466b45833117f78e1122181960b2cac3d17b1c2946e454ea3f8474951bd4b0d8490eb9381b3cec211c6c165755d0c585c518b4fe103896bd3d204e844e86bc17b8177af922e78e29b6e9849e9122514d438edbfe7d58101498c79cd1894b927f4adb4b3961a7578fcc73f1cee49f44c918b28b21eebc39cf9ac09b1c8858de2dc605014c293af22b0bc584b99981f97ab8e0ab6855b9e477a6c5c3d8c7bf9b5f8f333f2b318e76aa1826182c5882cb63804fe0c6a7ca16617af57dbe", 0xf0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdir(0x0, 0x0) 05:14:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000180)=0x10000) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x3) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x2000) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000100)=0x48b1) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000140)={0x1, 0x0, 0xfffffffc, 0x80000001, 0xb, 0x1cf}) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c962c"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="e0f117207212ed3d4fc3ea8503b6a5595aff783157077bbf90936bf38fb54071130e116242b3c72e096a2268f3dc651daeafc9026f6633313772d095c509ed7dd7a779f4b27073ffaf4f0a11f6f4e7e6036bd92d98dfe8afaeaad91eb9c774ec1200c707c723fcb4fdbc8ed7565024f07b53a451fde64620be198f58c871c639"], 0x1}}, 0x0) 05:14:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x2000000) 05:14:22 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) [ 299.187703] IPVS: ftp: loaded support on port[0] = 21 05:14:22 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:22 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) fchdir(r0) 05:14:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = dup(r0) accept4$inet(r1, 0x0, &(0x7f0000000180), 0x800) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="894cd43ad19fa6a6c09f4f6ddf6faea54322179836345c7cca72547a705b6c1f5f3aec8b2070e0cb08d95f7f777fe82666eb236a660b0d3edd4f7de5d875b0deba00c6d79d60fe7ad8f6b854e80243f960b451fb3e771b9ac6b3f8684fcc2c8f"], 0x1}}, 0x0) 05:14:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4000000000000, 0x4000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @remote}, 0x100000000}}, [0xc7, 0x2, 0x3, 0x2, 0x2, 0x6, 0xeed, 0x6, 0x32fc, 0x19, 0x1, 0xfffffffffffffff8, 0x8000, 0x80, 0x2]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000000c0)={r4, 0x68, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x40, @mcast1, 0x35b}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e21, 0x5, @mcast2, 0x80}]}, &(0x7f0000000300)=0x10) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@local, @in=@loopback}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 299.712941] IPVS: ftp: loaded support on port[0] = 21 05:14:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x80800) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendfile(r1, r0, &(0x7f0000000140), 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) tkill(r3, 0x1a) getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x287ffe, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f00000002c0)="2d7c317f405b0a6d46683d15fef21f334df68ac75506142a49989833fbfd9a112fcc2f5af479de8d18c6287a5883657b9fd71896466b45833117f78e1122181960b2cac3d17b1c2946e454ea3f8474951bd4b0d8490eb9381b3cec211c6c165755d0c585c518b4fe103896bd3d204e844e86bc17b8177af922e78e29b6e9849e9122514d438edbfe7d58101498c79cd1894b927f4adb4b3961a7578fcc73f1cee49f44c918b28b21eebc39cf9ac09b1c8858de2dc605014c293af22b0bc584b99981f97ab8e0ab6855b9e477a6c5c3d8c7bf9b5f8f333f2b318e76aa1826182c5882cb63804fe0c6a7ca16617af57dbe", 0xf0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdir(0x0, 0x0) 05:14:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xe82, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x2}, 0x2) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) getsockname$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="672d497f6e68227da994cd70471854000000000000"], 0x1}}, 0x0) 05:14:25 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) fchdir(r0) 05:14:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r1, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000000)) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:25 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x68, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x168, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 301.932852] IPVS: ftp: loaded support on port[0] = 21 05:14:25 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) fchdir(r0) 05:14:25 executing program 0: r0 = memfd_create(&(0x7f0000000000)='/dev/kvm\x00', 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000200)={r1, 0x1, &(0x7f00000000c0)=[0x2], &(0x7f0000000140)=[0xffffffff, 0x7, 0x1], 0x2, 0x6, 0x69, &(0x7f0000000180)=[0xffffffff, 0x6349, 0x3c, 0x4, 0x818, 0x9], &(0x7f00000001c0)=[0x1f, 0x7f, 0x8, 0x7fffffff, 0x8, 0x2, 0x7, 0x0, 0xffffffffffff8001]}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x402000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup2(r2, r4) dup3(r4, r3, 0x0) 05:14:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x46ac00, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1000, 0x40000) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x2040, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x5c, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8010) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r6, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 05:14:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x80800) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendfile(r1, r0, &(0x7f0000000140), 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) tkill(r3, 0x1a) getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x287ffe, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f00000002c0)="2d7c317f405b0a6d46683d15fef21f334df68ac75506142a49989833fbfd9a112fcc2f5af479de8d18c6287a5883657b9fd71896466b45833117f78e1122181960b2cac3d17b1c2946e454ea3f8474951bd4b0d8490eb9381b3cec211c6c165755d0c585c518b4fe103896bd3d204e844e86bc17b8177af922e78e29b6e9849e9122514d438edbfe7d58101498c79cd1894b927f4adb4b3961a7578fcc73f1cee49f44c918b28b21eebc39cf9ac09b1c8858de2dc605014c293af22b0bc584b99981f97ab8e0ab6855b9e477a6c5c3d8c7bf9b5f8f333f2b318e76aa1826182c5882cb63804fe0c6a7ca16617af57dbe", 0xf0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdir(0x0, 0x0) 05:14:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:26 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(0xffffffffffffffff) 05:14:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fadvise64(r0, 0x0, 0x8, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7, 0x200000) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0xff, 0x6556]) userfaultfd(0x0) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x20000, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:26 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() 05:14:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="b80c5b2a923795ed8a2701acc2b39c5bca7a73ef1ebc3f0fbde2d5c3d6638d540bfb13e369a3d75db315b651e941ef0502d64e97617550f78e21001726254e6302ffdcfaf86a2444a3c64d3076d95bdf8685bbb9d071aa328d635a11e3fa40697eabda451198099194877536262056383365bfdc9941b19be9f7fcccc9e16ab7d84b75f3cf480e79a6e70d43fabafbb8bafc66b44b5b26d09e1e1ff0447fd5067e2142ae17a1d22d850b449a7e4392b6dae4968b01733e2aa9b828d40f"], 0x1}}, 0x0) 05:14:26 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(0xffffffffffffffff) 05:14:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') write$UHID_INPUT(r0, &(0x7f00000004c0)={0x8, "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", 0x1000}, 0x1006) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@rand_addr=0x401, @in6=@local, 0x4e24, 0x8, 0x4e21, 0x4, 0xa, 0xa0, 0x80, 0x11, r2, r3}, {0x6, 0x9, 0x8001, 0x67, 0x1, 0x8001, 0x2, 0x101}, {0x1ec6ad30, 0xffff, 0x7, 0x86fc}, 0xffffffffffff5330, 0x0, 0x2, 0x0, 0x2, 0x3}, {{@in=@empty, 0x4d3, 0x7c}, 0x2, @in6=@mcast2, 0x3506, 0x4, 0x1, 0x8000, 0x1, 0x9, 0x4}}, 0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) [ 303.210438] IPVS: ftp: loaded support on port[0] = 21 05:14:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x80800) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) sendfile(r1, r0, &(0x7f0000000140), 0x0) ptrace(0x4207, r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r3, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) tkill(r3, 0x1a) getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x287ffe, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f00000002c0)="2d7c317f405b0a6d46683d15fef21f334df68ac75506142a49989833fbfd9a112fcc2f5af479de8d18c6287a5883657b9fd71896466b45833117f78e1122181960b2cac3d17b1c2946e454ea3f8474951bd4b0d8490eb9381b3cec211c6c165755d0c585c518b4fe103896bd3d204e844e86bc17b8177af922e78e29b6e9849e9122514d438edbfe7d58101498c79cd1894b927f4adb4b3961a7578fcc73f1cee49f44c918b28b21eebc39cf9ac09b1c8858de2dc605014c293af22b0bc584b99981f97ab8e0ab6855b9e477a6c5c3d8c7bf9b5f8f333f2b318e76aa1826182c5882cb63804fe0c6a7ca16617af57dbe", 0xf0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) mkdir(0x0, 0x0) 05:14:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x600, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="1f010000", @ANYRES16=r2, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x4040004}, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0xe4, r2, 0x208, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa5}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fff}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x10}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x24008000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a40)={0x0}, &(0x7f0000000a80)=0xc) r5 = getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000000b00)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000002300)={0x2600, 0x3c, 0x0, 0x70bd2a, 0x25dfdbfc, {0xd}, [@generic="28b43d31ec0109b17936c04e2e61fa9054be17428dfd405f8f5f992172e97dd0168ffa3d6413dd7e9658434ea7a6e8e1d403a92e08ae7c522c2681", @generic="1e6d8104c3692813898efd1a6901890ef36b05daae2382877b9504dcd9d8725ae8e0192bd9a93fd7e32fa6e9c0844230de118720cdd2e6a541dd69fe2544f374fbe6b52c879c4348883636c76d1889e7897c99dfd68a9212e470fe24c80dd273d42513bbe8fad56987a0f0f3c7491fe33e8ec9fe700ef155a5c9aeb02499c2ee68dee0ff2d2afccd9789d7986e76cff7e0c1116548dc14e811cf44afb3799a0a425f003f8dcc6be9d4c55a07a9e05c9c06b737df09fafbf67ad73933e1e34ce76a5ccb10fe3ab40fa43900", @nested={0x1e8, 0x42, [@generic="8013aee91426a572e24b0feef9123d3a2b79ae3ee962f6686f722739172c0e8240cfe74f81781017cc5e3366c493558fb8821f22", @generic="7797602cdb0748731d4f1288f00d01645557d532e0eea88b14f816f6d7b15204e26ee0c4b274564438c06214164801ff85b4140bccb230955e6dc4696a32da709946ee5708cb4ee0f03c2cfeb21c2ef998b7743420345ac733c5cfe0a2596fe66ad5210b27b87dd61875b1094fe4e16cc874daee5f05c9af99ac36367b1599aefd5bd2bd230349850b1b1f343c440ee2f2843638dd8b8ebfa4ee3b7dd15e7199fd0ed26a43888758ce56bd8e90c2aa7c336d50e16d8abbfb3753ea17b381899c9b0fad1e4d7af5a7d5cadb", @typed={0x10, 0x83, @str='/dev/midi#\x00'}, @generic="b2a0a4fd1386783565d2ce470cf96c7a4d5c36ebfc3e24423383bac811a25da48b3f693fc6217293943a4c0723920e06f46abbff9761b28802b2", @generic="0df34a7dcfc949493e3c635ee6ac9349237ba5cc73877590f9243b81b28470beefd86921b656ba5764efa7e8678917b5fbbadf11b199eaea7f7fa68f07c7f31b72f4626a7f3a4668b3a63cec04bd4ee343b6e243c8c9abb97acccacf4aef4ce4d1f755b9471c9bc9d327", @typed={0x8, 0x45, @pid=r3}, @typed={0x8, 0x5a, @ipv4=@multicast1}, @generic="681ea0a414ec5f45de30e46d2322", @typed={0x8, 0x49, @pid=r4}, @typed={0x8, 0x5e, @fd=r1}]}, @nested={0x21a8, 0x43, [@generic="b0c737fd0f9efc9abf4b82e554b18c208378c5d30ed4d865554f13b73d95dc9bc049ebbb9ad10b9d531f62789c20a96d5afef0065d065d461daa2d6b61bf4756bca9fed9f0d9803928cb907db25d6fe3af46aaf59b8d5b60b6d14622c65ff2f08caaf4dabe88ebfe5ba9f19ea63cd0750674479befdc4850499893d0bb23ff4bf73eef33a3fa63e611b27d072a546a18fb94c2369d3d8bcecada59bfa15d0b7eaf38b00ea2c13a162f151c5b32e3cbd3acc65fe4c9adedc74adcb5e080673630a254983b19ca93a037ce3a40", @generic="4e66ade0a33e4a6930516673f48eb9b5c59aba8e2e4a46d1157667917895953746aa0295b195531b2b14bdd7377db0d5fb40d3d73813b094fd81de5d93ddb7a0c9be34fd6fdb9a2dbb3ead87ffb7b222251d924a2f16965b3133ab0da248003f59cf2d99cc28248d07d5a6097a2c1eaa460969ab0f53d7fb041be78651dc5e772ecca85455f876b0bbebc9708e9038d6a5498115f10294f9d6ae1307311e058335241065bdec60e58f899a123064c8af630a41c14ebe81ea4f45b45393681dd6874daafe049db0eeae64e07bc6516991", @typed={0x8, 0x95, @fd=r0}, @generic="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", @generic="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"]}, @nested={0x144, 0x52, [@typed={0x8, 0x7e, @u32=0x8e9}, @generic="55bb8c872848a5c2a29a55773128b6e7dceca440c0f23c041f9732b1226ac880e51b0c3c0616b93b6c713319fd535536f2f0b91788b560c5a3d93b8d2723cdd61045a51ce0d337d9a798bbab83ce2c49a63868a6417ef851cea002488789ebb674f4610b4cada71cfbfa762636eeadd8d3209d1343f2c5cef614bc720bcc01a98efa263529f17e8859178a9d3715ffa76e3d4b68e7ffc5a63b8061836ed1cbb194d1f26112f887e69b14153e127261222edccb0b263618db63817b0829555a5e75cb9785f11971a1c0b430df994b2c08ff91ca8ab7f9a31982b6e9647da261adfe9cc30d29bb0a", @generic="8785e0c8d4f00f9e4f1ca4b9a86c6c7bd1b855b9be972895f0ab7507c99200a455f45ef6059322420f78f53d7b8df64bfca11807edc344939b25eff8216226d31f9f416711d712e8cdb380ed1253"]}, @typed={0x8, 0x8a, @ipv4=@broadcast}, @typed={0x8, 0x79, @pid=r5}]}, 0x2600}, 0x1, 0x0, 0x0, 0x4000}, 0x80) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000640)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000680)={r6, 0x1}) r7 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x6, 0x10100) ioctl$EVIOCGPHYS(r7, 0x80404507, &(0x7f0000000540)=""/205) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000900)="a1a757906ccd6475153b6d6ade43031b5a0f4e88ab64ac9f6b238d5576cc2646e290062aae8daebd1f63048f0b4249fa8c626de8c835bb009cd6d1492935aab2013c5c6f40794ea7b94f2743c28269f66c20bb36ea7057f937", 0x59) ioctl$DRM_IOCTL_SET_MASTER(r7, 0x641e) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x1b793260) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:27 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(0xffffffffffffffff) 05:14:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r4 = dup2(r0, r3) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000000c0)=0x1, 0x4) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) dup3(r3, r2, 0x0) 05:14:27 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x80800) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10400, 0x0) 05:14:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) dup(r3) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r4) 05:14:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) flistxattr(r1, &(0x7f0000000080)=""/138, 0x8a) [ 304.335783] IPVS: ftp: loaded support on port[0] = 21 [ 304.444841] loop3: p1 p2 p3 p4 < > [ 304.714805] IPVS: ftp: loaded support on port[0] = 21 [ 305.060923] IPVS: ftp: loaded support on port[0] = 21 [ 305.163537] loop3: p1 p2 p3 p4 < > 05:14:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0xfffffffffffffffc) 05:14:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e23, @local}, {0x2, 0x4e24, @remote}, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffc0, 0xfffffff000000000, 0x3}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x8) dup2(r0, r0) socket$packet(0x11, 0xfffffffffbffffff, 0x300) 05:14:31 executing program 2: syz_open_dev$dspn(0x0, 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x0, 0x300, 0x0, [], 0x0}) 05:14:31 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) 05:14:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x300, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="607e5e7502f6b12541872cad55be61cb0ceb252334d068113222d2b1569e823d98815b7b12af802edb6427fed0b611bd4b9c77c6351a856eaf00eaab7ef6b06ea0aeee46"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto(r0, &(0x7f0000000340)="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", 0xfd, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="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", 0x1ea, 0x1, 0x0, 0x0) 05:14:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x120, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x20000041) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0xfffffffffffffff8, 0x20, 0x6, 0x1}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004340)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000240)="1d", 0x1}], 0x1}], 0x1, 0x4884) 05:14:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7400, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) shmget(0x3, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) 05:14:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) dup(r3) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r4) 05:14:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) 05:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c00ea40b8a69302fd19c7a61645e310afe2b960d9a53f96fad22e53b966eee895bbb9eb6eee1214e6c84ec86bdffcb6036a744c7a542f195452806e0e51cf70ab442720f0e77a16fc403a20d18c60cbb5b33602e82e08d6701903415c83b5a3de66752b953ba7b37a53150e97070956d2937defe2861dd05eef1b82bc1c4ae465fee8234fa4a9b1e642f6a7dc00c8b5896eae1c78ac05533975278bf47dee0ce4c073768078e23d91bbef0b8352e09ee038e1873a7138fb29f8d447d1d1346a98d0afc2d80f2a9d04786a7690c2d4e29405ee5c44ab3649245a94715eb8d688dc971098d3da4e64ade74357f3ce1038daafd604086e9ea759b9034e0c00000000219a1e37de03bd177549512605d588483f090394a84b6dcaa804c1db5793e73ce4d019336e7c55a1a766299205e7b1761a805825f30686cdb97ee356d75b256353fea47950d41e40c907b38874bfbb921dc593af1ca0c4bfcb7fe6ffa57f96f0152341eaabc54b663a4e3ca559e55dbc1b69066f0257a7a9a8a3a827b3fe60eb9aae4c5f455dfc58dddb30f80425764f0651b943985fb551f869c0e8e0a3d9f82ed599f7f8ee809e8d8afa3b5ecaab86b027e93cd741e3949b5f1074074211986901c243853103103bbfe278fc9cfbab0f378d8f8c67", @ANYRES16=r2, @ANYBLOB="00022bbd7000fddbdf25010000000000000802410000001000137564703a73797a3200000000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 05:14:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:32 executing program 2: 05:14:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) fcntl$getown(r2, 0x9) dup2(r0, r2) dup3(r2, r1, 0x80000) 05:14:32 executing program 2: 05:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[]}}, 0x64008001) r2 = semget(0x2, 0x4, 0x42) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000002c0)=""/129) r3 = shmget$private(0x0, 0x4000, 0x2c7, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000000)=""/2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) write$P9_RWALK(r4, &(0x7f0000000140)={0x30, 0x6f, 0x1, {0x3, [{0x30, 0x1, 0x3}, {0x81}, {0x274a6e54ac26860, 0x0, 0x3}]}}, 0x30) getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 309.410479] loop3: p1 p2 p3 p4 < > 05:14:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:32 executing program 2: 05:14:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) getgid() sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffffff, 0x40000) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000080)) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:32 executing program 2: [ 309.680358] IPVS: ftp: loaded support on port[0] = 21 05:14:33 executing program 3: 05:14:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:33 executing program 2: 05:14:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3d86631b5ec3b0de23351d4833b68861aefb17115c0380ad6af3ce1253cff5b4f2b66efeb484657590d81b39a61a8a808fdbc7dd28137306a974f2ae1748266bcddf90567269c31f5279b786a0fc114d7720a1cbbeaa85898720e861c2282c215ef40ca1a508247a"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl(r0, 0x6, &(0x7f0000000000)="e67a3e8323a4d4d606e475b5de77e0e3a14a977717ed05dc851b1dd3c5") r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/138, &(0x7f00000000c0)=0x8a) 05:14:33 executing program 2: 05:14:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:33 executing program 3: 05:14:33 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) socket$alg(0x26, 0x5, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xc801) recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f0000000700)=[{&(0x7f0000000280)=""/216, 0xd8}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000580)=""/237, 0xed}, {&(0x7f00000001c0)=""/123, 0x7b}, {&(0x7f0000000680)=""/95, 0x5f}], 0x7}, 0x7}, {{&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000800)=""/83, 0x53}, {&(0x7f0000000880)=""/244, 0xf4}, {&(0x7f0000000980)=""/255, 0xff}, {&(0x7f0000000a80)=""/85, 0x55}, {&(0x7f0000000b00)=""/72, 0x48}], 0x5}, 0x6}], 0x2, 0x10040, &(0x7f00000000c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000c80)={0x7, 0x8, 0x4, 0xfffffffffffffc00, 0x7, [{0x4, 0x1, 0x7, 0x0, 0x0, 0x1}, {0x189b4587, 0xffff, 0x1, 0x0, 0x0, 0x200c}, {0x4, 0x2, 0x20, 0x0, 0x0, 0x200}, {0x3, 0x6, 0x100000000, 0x0, 0x0, 0x2105}, {0x2, 0x6, 0x1, 0x0, 0x0, 0x4}, {0x0, 0x6, 0x1df13f3c, 0x0, 0x0, 0x2380}, {0x101, 0xfb80, 0x1, 0x0, 0x0, 0x2000}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:14:33 executing program 2: 05:14:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:33 executing program 3: 05:14:33 executing program 2: 05:14:33 executing program 3: 05:14:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:34 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:34 executing program 2: 05:14:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) prctl$PR_SET_TIMERSLACK(0x1d, 0x6) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) connect$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x7, 0x7ff, 0x68f, 0xffffffff, 0x8, 0xfffffffffffffffe}}, 0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x3, "ba9d67277a8538e1"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x4, 0x0, 0xfff, 0x6, 0x5b10, r4}) r5 = dup2(r0, r3) dup3(r3, r1, 0x0) r6 = shmget(0x1, 0x5000, 0x50, &(0x7f0000ffb000/0x5000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000640)={{0xdb18, r7, r8, r9, r10, 0x0, 0x7}, 0x2, 0x7f, 0x2, 0x4, r4, r4, 0x4}) 05:14:34 executing program 3: [ 311.084300] Unknown ioctl 35075 [ 311.099483] Unknown ioctl -1069018509 [ 311.174173] Unknown ioctl -1069018509 [ 311.185050] Unknown ioctl 35075 05:14:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x400000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:35 executing program 2: 05:14:35 executing program 3: 05:14:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x80) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000140)={0x0, @reserved}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(r0, r3) r4 = dup3(r3, r2, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000040)=0x7) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f0000000280)={0x4, 0x0, [{}, {}, {}, {}]}) 05:14:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:35 executing program 3: 05:14:35 executing program 2: 05:14:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="7781c8102479a3e8e38d831b2e1fea000000c64348337d0fd2528210b41fe2b38c7df3cabcb29bd194e29a136fa6c24714321d69d23eb8f773acf15543f3a57db9dc4ddec331812bfa78fb205e6c6908c9028d39257c7b59a8757bbab11ff3946653405dab84b1fbcc1a62941462e9262e2987d68bcb153eb3a765d8f93ca75aa599c867094bcb765280"], 0x1}}, 0x0) 05:14:35 executing program 3: r0 = socket$inet(0x2, 0x10000000000a, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000840)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, 0x0, 0x0, &(0x7f0000000d80)=[{0x68, 0x0, 0x6, "6ae4c4ddf24de1aacfdd08a057045a8fc333b2767c6cd99f0469b0936aa86bdca14c64c6a6bc96cb51ec4fba2a7412d73ac688134eec7870b78262eb55b1fc57485a8b547a6d2f249ac8255b35e70a2c68ee96"}], 0x68}, 0x8}], 0x1, 0x68d0235072c6709a) 05:14:35 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x6040, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:35 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:14:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="009f73444f05bf9961b154152ce33b9200000000bb5288496ef1b3df"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:35 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 312.559045] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) 05:14:36 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:14:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000780)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 05:14:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x800002, 0x13000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r2, r2) dup3(r2, r2, 0x800000080000) 05:14:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x68000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:36 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:14:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x820e, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0xfffffffffffffdc7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000180)) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:36 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9201, 0x0) 05:14:36 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:14:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x48100, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x10000, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r4 = dup2(r3, r0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000)=0x100000001, &(0x7f0000000040)=0x4) dup3(r3, r2, 0x0) 05:14:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x500, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:37 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 05:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="fb51d3dbc6c98348e1e787c04503916b791cee176748ed131611b7fc504db326cdb0ad82145dd5d3019598a0e4fd7e044da9eebe7ff7b021ebb4fee0056e8342724f23e9e0fc24373952ede52136352df67a28277c284526b4a7ce85ab0d16af5fb508f111b6b0df24fd377f4e28f5b7a9e4fb9e8e1236aa676e0ffc68bd9317812883d5bf97073c867b8167a1cd904b98591870b7201fde66b6d92c15d31ee80664c8b07d6b9d1090a6364bbc25b7d69c0bcd456b5d07747f379ec257848cba126246c26ed2ef12206cd32dd791fb7ed0e556d4"], 0x1}}, 0x0) 05:14:37 executing program 2: syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9201, 0x0) 05:14:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:37 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x2, 0xa9d}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={r1, 0x88, &(0x7f0000000280)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x7}, @in6={0xa, 0x4e22, 0xb3, @local, 0x10001}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e22}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f0000000200)=0x10) r2 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="e51cc9673f01565430c9c43ffbd5ea93a075b4fde0c4a3e16b6ca633888fe82677aa3104de0584de1da867fa6a24d5499d9dd1235f4c9b68fb316388fbef0e3250e0a152ebaf0462c2b43624161c8a300393fea6684a73c4010004a5a7da1a310eb73299edad0fa5375ade81efe23564fd8e9fc660aad7e1301a98efc76b25136318c1a1fe2e6a18f80024cb5d2a3d51cc91a8fa45b3f9235efdfc54faf8731b30aeee239c9c3da3b54bddd4ac2fc48f5b6b3ce4fe3a885b6393a7137a846db2e0c59ef71d1e6eae5d3c65af153233f3c23663938b", 0xd5, 0xfffffffffffffff8) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000580)={0x4, r0}) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="6c6f61642064656661756c7420757365723a2f6465762f6b766d002030303030303030303030303030303030303030372000386566001c224f644fe093bd16f9be955e6f473bb0f15ae973dfec0ceb2646eaa944f45a18eb9164adca4b0e6e6c3c6545a6de4735cae11e8f582ed583709f84054a99cc83e780cd1c0b5a5589cd4f1ae9476abef9da821224c0d4e195fdfba8c9eb79bf"], 0x36, r3) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) dup2(r4, r6) dup3(r6, r5, 0x0) 05:14:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="b93c564b636700000000b4ce360000a2", 0x10) 05:14:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:37 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="f9236f545e545f3b40f46c43f42a3d4523b17d"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9a7d585254bf306dac2a40703b5ae86c309c6d1fe8a6b5f3a4a2762ea8a35dbe4ad0203581a514db741f5797be56edea39c2671bf7a380259dc1e165c6c21a1261570c0b5f153b0b5687681ab2383080fd3abaedded11373386020a67c527c8e35b011dc41ba9c8260aab7560e575b7e8a74424b121748a5c18fd0789d0e90510ed773decb4b5ab7b7e72eb0b4e6959df80141daf3f161a0f3626df86eeb133c5ab50f229810e507"], 0x1}}, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000000)={@ipv4={[], [], @loopback}}, &(0x7f0000000080)=0x14) 05:14:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000)=0x5, 0x1, 0x5) 05:14:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) shmget(0x3, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) 05:14:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r4}}, 0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r5) dup3(r5, r1, 0x0) 05:14:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000080)=""/235) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="a372035bbc"], 0x1}}, 0x0) 05:14:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x820e000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x138, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x200}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x40}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x33}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x79e}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff7fffffff}]}, 0x138}, 0x1, 0x0, 0x0, 0x20004894}, 0x80) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="589e391d7366a78e5d841b264006dff928d8ab51c444a57ef6cdf2e25a0b2e35fc9e4c651b36f593802c89c40a90292a74a26d05ddaabd6d8fb511eccfae80606ae4ab43237ee54b912982875047fa92d295f7a6a59af2e626a2872a550900000000fd59add4d2e3f83ac50b361490d139a00049e97dd69575ea6af50ad728fc459517a0ba97e554fb9b4658abdffaab6156a3195a2c30bb6aa2a4abbce26c28bad1fbd7725571"], 0x1}}, 0x0) [ 314.728847] Unknown ioctl 1075883590 [ 314.803025] Unknown ioctl 1075883590 05:14:38 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:38 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x6, 0x9) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r3, 0x300, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4040080) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f00000000c0)) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x5}, 0x8) 05:14:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "5ddeef318fcc5b95e27a0bcd1629099a62caf3"}, 0x14, 0x1) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000140)=0xa6, 0x8) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x700, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:38 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40000) 05:14:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x80000) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x18, "17fb46de2bbf6c1d486d4f16b23d034fddeb43769dcf5b51"}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r2, 0x0, 0x3}, &(0x7f0000000100)=0xc) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b75cf80aeb9ca1a67d34c2afa7eda1feada90000000000000000000000000000002d19fe5e4107b5de570950c0b733709f0ed68907ea02dcea31837f34872161c5306dc5b750479b99e920c50417fd1b5fd8a5c85cb4ddd247d95344fc6e24c5f54775db8ce9480b4d3dfecf4972fcb16eed2128a8892acc9682e013f861a33a5e6b74d5d2de9c7d84817c0eed46cba2"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000140)={0x0, 0xfed4, &(0x7f00000022c0)={&(0x7f0000000180)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x4) 05:14:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1, 0x81, 0xffff, 0x8e, 0x401, 0x1000, 0xac}, 0x1c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x1, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:14:39 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:39 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x7aa634de82bd1da5, 0xf}}, 0x20) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x21000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x30, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'dummy0\x00'}}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004041}, 0x8000) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000700)=""/255) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r2, 0xfffffffffffffff9}}, 0x18) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000002c0)=ANY=[@ANYRESOCT=r4], 0x1}}, 0x0) 05:14:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffffff8, 0x100) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:14:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x33) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffd, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x5, 0x7, 0x7f, 0x9, 0x5, 0x6, 0x1, 0x9, 0x3ff, 0x80000001, 0x9, 0x3ce, 0x0, 0x574, 0x0, 0x7], 0x0, 0x22010}) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) getpeername(r1, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) 05:14:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) accept4$bt_l2cap(r3, 0x0, &(0x7f0000000000), 0x800) dup3(r2, r1, 0x0) 05:14:40 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x46ac00, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1000, 0x40000) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x2040, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x5c, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8010) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r6, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 05:14:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x20000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x100) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="0140b072840b8048bff6400000409da00000000000000000000000000000", 0x1e) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4e5e52158c92f64c10884220c9aaba9e5bb6e820a6c5bb438aec9fbd5036e1e416c45702f6ea3308a627856956834869754e06a05f26865bee64a8dc4de9d237e79a4434b0429e4bb6061c7ed6756a8035930a9dbe44912373a2f3c3bf329cb099c47454c868883dc2d799ed6bc726be9bfd1081d0142830b697afb2599725bb3476a18d42c98859b9958a18ebccf3836c760375651f3fb9a26ce7beb191c75d921a475d9a52ad709e42a9938594644227170150b5ebef6211f565bad4f9702f9bd37baf58eee48bc60bb0ad9f570df1c45b73670d7fd3a3802d93664abd98c86e16207fbf2fe57b01f2074f0f2625f55267947e6bbeee5570"], 0x1}}, 0x0) 05:14:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12000) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001680)={@empty, 0x6e}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0x4, 0x4) migrate_pages(0x0, 0xff, &(0x7f0000000080)=0xfffffffffffffd5b, &(0x7f0000000100)=0x9) getegid() add_key$keyring(&(0x7f00000016c0)='keyring\x00', &(0x7f0000001700)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x786, 0x64c0, 0x8}, 0x0) dup3(r2, r1, 0x0) 05:14:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="599eb7730b63b94f055e2d223e33c9973ef74f717b329a1947402a"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="106b38273e45429ed187c7f9f0d37faf44b18e80b01a266836a8791511af8bd668cf8026b7fc1fe0f93d679879b8"], 0x1}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000003c0)) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0xc4, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb111}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x97}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0xc4}}, 0x40) 05:14:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x4c00000000000000) [ 317.657091] Unknown ioctl 35094 05:14:41 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 317.830092] Unknown ioctl 35094 05:14:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x30000000, 0x200000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x3000) 05:14:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12000) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001680)={@empty, 0x6e}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0x4, 0x4) migrate_pages(0x0, 0xff, &(0x7f0000000080)=0xfffffffffffffd5b, &(0x7f0000000100)=0x9) getegid() add_key$keyring(&(0x7f00000016c0)='keyring\x00', &(0x7f0000001700)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x786, 0x64c0, 0x8}, 0x0) dup3(r2, r1, 0x0) 05:14:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xf0ffffff00000000) 05:14:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2a947495bfaf82de02081b54e38153eac6802d5e68776387921b199b8760eef39485373f", 0x24) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:41 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:41 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x74, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000080)={0x3, 0x0, [{0x0, 0x4, 0x0, 0x0, @msi={0x39, 0x0, 0x3a74}}, {0x4, 0x6, 0x0, 0x0, @adapter={0x7, 0x76d0, 0x9, 0x800, 0xe9cc}}, {0x100, 0x5, 0x0, 0x0, @adapter={0x200, 0xff, 0x1ff, 0x9, 0x7}}]}) ioperm(0x8000, 0x0, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x5, 0x8000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000400)={'bridge0\x00', {0x2, 0x4e20, @loopback}}) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x7, &(0x7f0000000240)=0x4) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000380)) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvfrom(r0, &(0x7f0000000140)=""/75, 0x4b, 0x2, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x0, 0x2, {0xa, 0x4e20, 0x3, @remote, 0x6}}}, 0x80) [ 318.473567] Unknown ioctl 35094 05:14:41 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)='/selinux/policy\x00', 0x10, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x5) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000140)={0x0, 0x0, {0x20, 0x80000001, 0x1000}}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000001c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) io_setup(0x9, &(0x7f0000000340)=0x0) io_submit(r4, 0x1, &(0x7f0000000300)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r3, &(0x7f0000000280)="552a944043f74cfcb83c4d48a2e191a1cfb9dba12ee15be95e1d5976b005789febab7c223cecd65f96e72ae28d6d4ae70b1ad9568e28be1056640c53954a4372931816a035249f510be596ebd3519dc33258f57801afd640b65d965934a342777688a50626ed1bd920a97908cd2244c96aab9298b608387feafd1a4efaf455", 0x7f, 0x4, 0x0, 0x2, r0}]) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000180)={0x7fff, 0x93f, 0x7ff, 0x5, 0x800, 0x4, 0x7fffffff, 0x2, 0x4, 0x8}) getsockopt$inet6_dccp_int(r0, 0x21, 0xb, &(0x7f0000000380), &(0x7f00000003c0)=0x4) dup2(r1, r3) dup3(r3, r2, 0x0) 05:14:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80020040}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x74, r2, 0x901, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ca}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8df4f3ac9e381bf0b57a5e3adb2019b97247cc025129bfe564a190a6e4f97f2ca34aea9ad116c2f221991085d6edaccef713c1ab4d978a4adc4a2bc4b203c21a075763a66b6a9036133ae94e02ee16bab93c3197fbc8f7f4e6cb87dc8cf4cf70ab0920798c5c820f52e9ed8ac546675cc728c47112a9b68a76dee3a18df06b26ed202ce68a8d7f7947e45c15d317cf9e18ac34e93f"], 0x1}}, 0x0) 05:14:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12000) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001680)={@empty, 0x6e}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0x4, 0x4) migrate_pages(0x0, 0xff, &(0x7f0000000080)=0xfffffffffffffd5b, &(0x7f0000000100)=0x9) getegid() add_key$keyring(&(0x7f00000016c0)='keyring\x00', &(0x7f0000001700)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x786, 0x64c0, 0x8}, 0x0) dup3(r2, r1, 0x0) 05:14:41 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:42 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x20000) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000180)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03e0d7263043770d9b5d6afbb1a2c7550805021f8cce36056ff9dae95a2ab197ed39831234e769a81115beb7766e1df9eb2e2cd54269e165669e3ce63dca0882bd6da83084e0d943fd00143a5bc2a2a2c826706da0d98fcf0c73e9066a26be9e58c73d85b2e8e3fbc3deff1db803804d9960fdaeb96ee9ff4c86b4ecff0000008dc04264e0e99b26d4fc48ca50224e4e895ae3c83c1a0eccbb147bb68e9c3a432322"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000000)=0x201000, 0x4) [ 318.861704] Unknown ioctl 35094 05:14:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:42 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000280)={0xa2bb, 0x9, 0x1000, 0x20, [], [], [], 0x100000000, 0x22126a1d, 0x4, 0x1, "e184566b254c6c4f41a229c9e3da45a4"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) 05:14:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x2, 0x5, 0x8, 0x8, 0x33, 0x0, 0x70bd2a, 0x25dfdbfb, [@sadb_x_filter={0x5, 0x1a, @in=@local, @in=@rand_addr=0x5, 0x1, 0x0, 0x10}, @sadb_x_sa2={0x2, 0x13, 0x3ff, 0x0, 0x0, 0x1000, 0x3503}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @rand_addr=0x21ba03d8}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}}, @sadb_x_nat_t_port={0x1, 0x0, 0x4e20}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0x5, @mcast2, 0xf2}}, @sadb_x_sec_ctx={0x1d, 0x18, 0x4, 0x4, 0xdd, "e90b36d4e646a802bf67b3b4d17e51b5a25dfd21baef54b35d1632c0bb794119f8fda2e8c5434c475a24524f1ce58803cfd845ecabaaffe8a072b0f93b02a9214c52e2468c680f374d0f1de9d5ba88db2644d4e69f0eed01f5c70afcd972fcb79a68d332b5488e9efaa3cda2f2b4340136f84b18cb16d25bc2228c8f791d9241ee433252509e5f5d69e17d47ca3aae516a1c9e4ae91d777c8bfbb25d7d936bd6597c228c891d4ff638fc905403a1c58a789c62e1f92d2f181e6147ec8320ec4ccca80fd98079998e9ae8a7f7874a6133dad68602a93a2498688c7e95c4"}]}, 0x198}}, 0x4000000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:42 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:42 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x24008000) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000040)={0x0, 0xfffffd9a, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0xffffffffffffffff) 05:14:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:14:42 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @broadcast}, 0x29, 0x0, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000080)='veth1\x00', 0x9, 0xfd, 0x6}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000140)) 05:14:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900", 0x48, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000140)={{0x1ff, 0xf4f1}, 'port1\x00', 0x81, 0x10000, 0x4, 0x5, 0xfffffffffffffa20, 0x5, 0x401, 0x0, 0x2, 0x4}) dup3(r2, r3, 0xffffffffffffffff) 05:14:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000000c0)={0x0, 0x1aa, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x4) accept4$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10, 0x80800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x4000800) 05:14:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = memfd_create(&(0x7f0000000400)='\xf4\xe4\xc8\a\x00\x00\x00\x00\x00\x00\x00\xd6d\xf1\xef7\xfcs\xc7\"p\xc1\xc6 O\x96\xd4\xd4\x9b\xa8\"U\x9d\xdb\xf9\x03\x00\x00\x00\x00\x00\x00\x00\x9a\x999\xed\xbb\x8ds\xd85\x1e\x00\x00\x9f\x9d\xd8X\x0e\xb9\xefD\xc7\xce\x03\x12Q\x9em', 0x4) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000180)={0x2, 0x0, &(0x7f0000000080)=""/200, &(0x7f0000000000)=""/19, &(0x7f00000002c0)=""/160, 0x7000}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000001680)=0x1d, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[]}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2000, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000140)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x2006, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(r0, r3) r4 = dup3(r3, r2, 0x0) finit_module(r4, &(0x7f0000000000)='trustedlo\x00', 0x2) 05:14:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e515320000000002008801260001000000640000000001", 0x30, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:43 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000000)=0xfffffffffffffffa, 0x8) 05:14:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200180, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/159, &(0x7f0000000040)=0x9f) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:14:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = memfd_create(&(0x7f0000000000)='$usersecuritywlan0vboxnet0\x00', 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000080)={0x10000, 0x4, 0xffff, 0x80, 0xfffffffffffffff7, 0x5, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', r3}) 05:14:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5ad6"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30d359f9d7c49188556b8a7aa5b1b34ead735004ad3a8108cfc20c763cec04eb1463178d1d830a07c108bcc674f00bbeafb868c706c43f1ffe7dae642a6591abb67ba3341e96ce1a0928d2058d3d51db1769444ae8f5b44e2784fe25d9e934eb786246c1a68d760bda04f077fdd5e55a7d1ec3e4091a4192636c3c8cb5ad587026c44cd14903c961269afb811ddc97bbd7f3dbfc5ccc8d9337269d019d9cb384049585fdd3db01"], 0x1}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x140) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x6}, &(0x7f0000000180)=0x217) r4 = msgget$private(0x0, 0x581) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000380)=""/103) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfffffffffffffffd, 0x1, 0xff, 0x9, 0x4}, 0x14) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x4) 05:14:44 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80400, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0xc59, @local, 0x6}}, 0x3, 0xffffffff80000000}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x7fff}, &(0x7f0000000200)=0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup2(r2, r4) recvmsg(r0, &(0x7f0000001780)={&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000300)=""/131, 0x83}, {&(0x7f00000003c0)=""/165, 0xa5}, {&(0x7f0000000480)=""/104, 0x68}, {&(0x7f0000000500)=""/127, 0x7f}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/179, 0xb3}, {&(0x7f0000001680)=""/115, 0x73}], 0x8}, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x400) dup3(r4, r3, 0x0) 05:14:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x200000807fc) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'team0\x00', 0xfff}) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001640)=ANY=[@ANYRES64=r1, @ANYRESOCT=r1, @ANYBLOB="8153c5a4eb9f42b8658ef8", @ANYBLOB="c4f9c924676dd4af3c0b8c4e4a9367e745580cf92d76703037f22e4bc5dbe5d66d6fc9bd700265ded1b682166fccee6628e86efe8262a764f8d9a22410fbaa8c59ae22e773135272cf91ddec068435ca0448431585a70558c0b3c30a5cbc36d8572630e2a838ce3c07e3e50d157b985c3f56b252b9c4e99a0c3c9ed209c408a8abe3322b6eafebf502b50124b58417c7be7af7a1a162af1c36995809e469f0a2a1da8070173cd0f2f8af22bea4f2e06ca1aa3f10c8f13c774588bb037a56d26b20e9fea17ea769e5beffcd6255c54fb9ac30051c0d34dfc5f1246469e7bc8b81f8bd36df36f94846e2183266", @ANYRES16=r1], 0x5}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x24008005) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$tipc(0x1e, 0x2, 0x0) write(r1, &(0x7f0000000100)="3b8921154578d94b10c3dda2a9974946743ea00449745d474eaf72ba8de9cd24a73255d18b039f2309a804f69e1454f6d730a7dbc158f2029dbc60701bc847d0b7bcdd87f690f6dafe65045fc20a7ee3a827f96885912dc472f78beba71e92f8efe43549095fc07b2188e8582759de13870c01203736e0485c2e5d55515bac2ef2338d963a74d39bf9c0303c8a3aa22266dc255bebfa3019b188182eb93f667aa069591bc4a683bc2020c3baeb41", 0xae) 05:14:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:14:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r2, &(0x7f0000000280)={0x63, 0x7d, 0x1, {{0x0, 0x4e, 0x4, 0x2, {0x8, 0x2, 0x3}, 0x2000000, 0x3, 0x830, 0x2, 0x0, '', 0x9, '/dev/kvm\x00', 0x9, '/dev/kvm\x00', 0x9, '/dev/kvm\x00'}, 0x0, '', r3, r4, r5}}, 0x63) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r6) dup3(r6, r1, 0x0) 05:14:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x820e0000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000400)={@loopback, @remote, 0x0}, &(0x7f0000000440)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000480)={0x0, @empty, @multicast1}, &(0x7f00000004c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x114, r2, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}]}}, {{0x8, 0x1, r6}, {0x4}}]}, 0x114}}, 0x4000004) [ 321.679536] loop3: p1 p2 p3 p4 < > [ 321.695503] loop3: partition table partially beyond EOD, truncated [ 321.722586] loop3: p1 start 1 is beyond EOD, truncated [ 321.742752] loop3: p2 start 101 is beyond EOD, truncated 05:14:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 321.780717] loop3: p3 start 201 is beyond EOD, truncated [ 321.809085] loop3: p4 start 301 is beyond EOD, truncated 05:14:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) recvmmsg(r0, &(0x7f0000003cc0)=[{{&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001640)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/91, 0x5b}, {&(0x7f0000000000)=""/38, 0x26}, {&(0x7f0000000180)=""/27, 0x1b}, {&(0x7f0000000240)=""/17, 0x11}, {&(0x7f00000012c0)=""/247, 0xf7}, {&(0x7f00000013c0)=""/127, 0x7f}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001480)=""/177, 0xb1}, {&(0x7f0000001540)=""/98, 0x62}], 0xa, &(0x7f0000001700)=""/37, 0x25}}, {{&(0x7f0000001740)=@xdp, 0x80, &(0x7f0000001980)=[{&(0x7f00000017c0)=""/239, 0xef}, {&(0x7f00000018c0)=""/190, 0xbe}], 0x2, &(0x7f00000019c0)=""/73, 0x49}, 0x101}, {{&(0x7f0000001a40)=@ipx, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/5, 0x5}, {&(0x7f0000001b00)=""/6, 0x6}], 0x2, &(0x7f0000001b80)=""/160, 0xa0}, 0x8000}, {{&(0x7f0000001c40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001cc0)=""/102, 0x66}, {&(0x7f0000001d40)=""/10, 0xa}, {&(0x7f0000001d80)=""/113, 0x71}, {&(0x7f0000001e00)=""/22, 0x16}], 0x4, &(0x7f0000001e80)=""/251, 0xfb}, 0xcb2}, {{&(0x7f0000001f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003640)=[{&(0x7f0000002000)=""/158, 0x9e}, {&(0x7f00000020c0)=""/5, 0x5}, {&(0x7f0000002100)}, {&(0x7f0000002140)=""/153, 0x99}, {&(0x7f0000002200)=""/165, 0xa5}, {&(0x7f0000002300)=""/233, 0xe9}, {&(0x7f0000002400)=""/75, 0x4b}, {&(0x7f0000002480)=""/217, 0xd9}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000003580)=""/144, 0x90}], 0xa}, 0xb27}, {{&(0x7f0000003700)=@l2, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003780)=""/52, 0x34}, {&(0x7f00000037c0)=""/119, 0x77}, {&(0x7f0000003840)=""/218, 0xda}, {&(0x7f0000003940)=""/207, 0xcf}], 0x4, &(0x7f0000003a80)=""/206, 0xce}, 0x7}, {{&(0x7f0000003b80)=@ipx, 0x80, &(0x7f0000003c00), 0x0, &(0x7f0000003c40)=""/95, 0x5f}, 0x98}], 0x7, 0x100, &(0x7f0000003e80)={0x0, 0x1c9c380}) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000003ec0)='tls\x00', 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x101fd, 0x1, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r1, r0, 0x80000) 05:14:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="75c88a3e73cb1d0f74334345ea9f41d83e56df5555004bc246b46629b66cf9e723fc7956e6fc0418b6c7ef97d97be24b3bb565281ecfbf1e8464db3f3483ef631726d86315de67e683cac2c1a9b8ae4753c88db03b98f0dec5592647c51b67ae6d9b7772a2a65711a3671e93c03fd54d2f614087ab6dfffb7f8c1613846553a8a14df586d2"], 0x1}}, 0x24008000) 05:14:45 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:14:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r1, r2) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0xfffffffffffff801) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xbc, 0x80) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:45 executing program 2 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 322.355723] FAULT_INJECTION: forcing a failure. [ 322.355723] name failslab, interval 1, probability 0, space 0, times 0 05:14:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 322.399057] CPU: 1 PID: 14264 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 322.406465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.415818] Call Trace: [ 322.418447] dump_stack+0x244/0x39d [ 322.422102] ? dump_stack_print_info.cold.1+0x20/0x20 [ 322.427348] ? lock_downgrade+0x900/0x900 [ 322.431539] should_fail.cold.4+0xa/0x17 [ 322.431562] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 322.431585] ? lock_downgrade+0x900/0x900 [ 322.440757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.440776] ? proc_fail_nth_write+0x9e/0x210 [ 322.440793] ? proc_cwd_link+0x1d0/0x1d0 [ 322.440816] ? find_held_lock+0x36/0x1c0 [ 322.440838] ? perf_trace_ext4_ext_remove_space+0x468/0x800 [ 322.468786] ? perf_trace_sched_process_exec+0x860/0x860 [ 322.474246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.479790] __should_failslab+0x124/0x180 [ 322.484035] should_failslab+0x9/0x14 [ 322.487856] __kmalloc+0x2e0/0x760 [ 322.491407] ? strncpy_from_user+0x5a0/0x5a0 [ 322.495823] ? fput+0x130/0x1a0 [ 322.499106] ? do_syscall_64+0x9a/0x820 [ 322.503117] ? __x64_sys_memfd_create+0x142/0x4f0 [ 322.507961] ? do_syscall_64+0x9a/0x820 [ 322.511942] __x64_sys_memfd_create+0x142/0x4f0 [ 322.516611] ? memfd_fcntl+0x1910/0x1910 [ 322.520693] do_syscall_64+0x1b9/0x820 [ 322.524584] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 322.529961] ? syscall_return_slowpath+0x5e0/0x5e0 [ 322.534901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.539747] ? trace_hardirqs_on_caller+0x310/0x310 [ 322.544794] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 322.549812] ? prepare_exit_to_usermode+0x291/0x3b0 [ 322.554833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.559687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.564877] RIP: 0033:0x457669 [ 322.568086] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.586982] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:14:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 322.594684] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457669 [ 322.601947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 322.609210] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 322.616474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 322.623737] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000003 05:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r3, 0x700, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd72b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 05:14:46 executing program 2 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="8975fcaece810f272991585afd00661254edfc0cf4844cce485e7cb2bbb9ddd5287111584db925bd8069dc166aa57f8c1b4c1b5ff5d191ebcdf98b51c7e6521699efdd93bd8189179e02e6bccb05bf885dfcd95b3da94ce2776d73013d36aeeb4e03e486a5d7b7df468bef99d03b97414ad3c0579e1d2e8f04d8c0a75cec4a5582293ebe4efcc88ff14497af73d856d2479db9e597e25590dc6457076bd6644b7eea1f5b6aad4e66d599338243b1c3a943357f8c2ab8894c6ad65e35938722c37728a9926cd7e2acf150cb38a7953898320894bff775601f779cbb2ba8944825471360bfbeb8df39b3f28ec6e8c86bddf5436a6f"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 322.866483] FAULT_INJECTION: forcing a failure. [ 322.866483] name failslab, interval 1, probability 0, space 0, times 0 05:14:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 322.926886] CPU: 1 PID: 14289 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 322.934280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.943649] Call Trace: [ 322.946273] dump_stack+0x244/0x39d [ 322.949932] ? dump_stack_print_info.cold.1+0x20/0x20 [ 322.955162] should_fail.cold.4+0xa/0x17 [ 322.959248] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 322.964391] ? zap_class+0x640/0x640 [ 322.968129] ? __lock_acquire+0x62f/0x4c20 [ 322.972390] ? lock_downgrade+0x900/0x900 [ 322.976581] ? check_preemption_disabled+0x48/0x280 [ 322.981630] ? find_held_lock+0x36/0x1c0 [ 322.985746] ? __xfs_trans_commit+0xfa8/0x10f0 [ 322.990351] ? expand_files.part.8+0x571/0x9a0 [ 322.994946] ? perf_trace_sched_process_exec+0x860/0x860 [ 323.000418] ? find_held_lock+0x36/0x1c0 [ 323.004499] __should_failslab+0x124/0x180 [ 323.008754] should_failslab+0x9/0x14 [ 323.012566] kmem_cache_alloc+0x2be/0x730 [ 323.016732] ? shmem_destroy_callback+0xc0/0xc0 [ 323.021424] shmem_alloc_inode+0x1b/0x40 [ 323.025514] alloc_inode+0x63/0x190 [ 323.029153] new_inode_pseudo+0x71/0x1a0 [ 323.033227] ? prune_icache_sb+0x1c0/0x1c0 [ 323.037479] ? _raw_spin_unlock+0x2c/0x50 [ 323.041656] new_inode+0x1c/0x40 [ 323.045035] shmem_get_inode+0xf1/0x920 [ 323.049045] ? shmem_encode_fh+0x340/0x340 [ 323.053294] ? lock_downgrade+0x900/0x900 [ 323.057456] ? lock_release+0xa00/0xa00 [ 323.061450] ? perf_trace_sched_process_exec+0x860/0x860 [ 323.066913] ? usercopy_warn+0x110/0x110 [ 323.071000] __shmem_file_setup.part.50+0x83/0x2a0 [ 323.075949] shmem_file_setup+0x65/0x90 [ 323.079955] __x64_sys_memfd_create+0x2af/0x4f0 [ 323.084658] ? memfd_fcntl+0x1910/0x1910 [ 323.088746] do_syscall_64+0x1b9/0x820 [ 323.092657] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 323.098071] ? syscall_return_slowpath+0x5e0/0x5e0 [ 323.103032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.107897] ? trace_hardirqs_on_caller+0x310/0x310 [ 323.112930] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 323.117974] ? prepare_exit_to_usermode+0x291/0x3b0 [ 323.123007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.127871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.133067] RIP: 0033:0x457669 [ 323.136274] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.155185] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 323.162904] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457669 [ 323.170183] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc5a2 05:14:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9204, 0x0) [ 323.177475] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 323.184754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 323.192031] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000003 05:14:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x80000, 0x2000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x40000) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000280)={0x0, @reserved}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x8c5e, 0x5, 0x800, 0xd4, 0x0, 0x7f, 0x182, 0x4, 0x1c0000000, 0x3, 0x0, 0x0, 0x0, 0x100, 0x154, 0x10000, 0x3a39, 0x100000001, 0x0, 0x8000, 0x0, 0x9, 0x4, 0x1, 0x4960, 0xa897, 0x1, 0x100, 0x10000, 0x7f, 0xfff, 0x81, 0x8, 0x400000000000, 0x7fff, 0x2, 0x0, 0xefe7, 0x7, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x40, 0x8001, 0x20, 0x7, 0x7ff, 0x1ff, 0x8}, r3, 0x2, r3, 0x0) 05:14:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc0045878, 0x0) 05:14:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6800, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="53577d0e02ba35dfed0d4221d032abf8c0aaf93bd57ec3716a24d177d20106676c1149f68c5203965e51747262241a393f596871fdf46e3d64b9010d7153fc57d64700426e673804bb08ea13ece0a3fcf584c462fad4a47b00fd78b9784e66b6ece935e4b13bb736f4f42d0b59d671a10c56e1ec827566598f73f0a1ab2a73000000000000000098a207c60de487dbb2bd61bf581ffaee39a1baefc387b27773f093a3843e7320f546c93433d1e5ab4148e54367d53e97d000000000"], 0x1}}, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 05:14:46 executing program 2 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) write$FUSE_WRITE(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x5, {0x7}}, 0x18) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8010}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x51c, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20040004}, 0x4000080) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 323.484864] FAULT_INJECTION: forcing a failure. [ 323.484864] name failslab, interval 1, probability 0, space 0, times 0 05:14:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x80089203, 0x0) 05:14:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 323.556131] CPU: 1 PID: 14321 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 323.563520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.572876] Call Trace: [ 323.575518] dump_stack+0x244/0x39d [ 323.579172] ? dump_stack_print_info.cold.1+0x20/0x20 [ 323.584396] should_fail.cold.4+0xa/0x17 [ 323.588530] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 323.593666] ? is_bpf_text_address+0xac/0x170 [ 323.598177] ? lock_downgrade+0x900/0x900 05:14:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40086602, 0x0) [ 323.602341] ? check_preemption_disabled+0x48/0x280 [ 323.607379] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 323.612330] ? kasan_check_read+0x11/0x20 [ 323.616491] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 323.621796] ? rcu_softirq_qs+0x20/0x20 [ 323.625778] ? rcu_softirq_qs+0x20/0x20 [ 323.629773] ? unwind_dump+0x190/0x190 [ 323.633698] ? is_bpf_text_address+0xd3/0x170 [ 323.638208] ? kernel_text_address+0x79/0xf0 [ 323.642656] ? perf_trace_sched_process_exec+0x860/0x860 [ 323.648140] __should_failslab+0x124/0x180 [ 323.652390] should_failslab+0x9/0x14 [ 323.656206] kmem_cache_alloc+0x2be/0x730 [ 323.660397] ? __shmem_file_setup.part.50+0x83/0x2a0 [ 323.665532] ? shmem_file_setup+0x65/0x90 [ 323.669689] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 323.674534] ? do_syscall_64+0x1b9/0x820 [ 323.678610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.683989] selinux_inode_alloc_security+0x107/0x3a0 [ 323.689216] ? inode_free_rcu+0x20/0x20 [ 323.693198] ? __put_user_ns+0x60/0x60 [ 323.697100] ? kasan_check_read+0x11/0x20 [ 323.701268] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 323.706558] security_inode_alloc+0x73/0xd0 [ 323.710892] inode_init_always+0x68f/0xd80 [ 323.715132] ? get_nr_inodes+0x120/0x120 [ 323.719200] ? rcu_pm_notify+0xc0/0xc0 [ 323.723104] ? rcu_read_lock_sched_held+0x14f/0x180 [ 323.728126] ? kmem_cache_alloc+0x33a/0x730 [ 323.732454] ? shmem_alloc_inode+0x1b/0x40 [ 323.736693] ? shmem_destroy_callback+0xc0/0xc0 [ 323.741368] alloc_inode+0x80/0x190 [ 323.745033] new_inode_pseudo+0x71/0x1a0 [ 323.749095] ? prune_icache_sb+0x1c0/0x1c0 [ 323.753337] ? _raw_spin_unlock+0x2c/0x50 [ 323.757495] new_inode+0x1c/0x40 [ 323.760867] shmem_get_inode+0xf1/0x920 [ 323.764849] ? shmem_encode_fh+0x340/0x340 [ 323.769092] ? lock_downgrade+0x900/0x900 [ 323.773246] ? lock_release+0xa00/0xa00 [ 323.777221] ? perf_trace_sched_process_exec+0x860/0x860 [ 323.782677] ? usercopy_warn+0x110/0x110 [ 323.786752] __shmem_file_setup.part.50+0x83/0x2a0 [ 323.791696] shmem_file_setup+0x65/0x90 [ 323.795681] __x64_sys_memfd_create+0x2af/0x4f0 [ 323.800389] ? memfd_fcntl+0x1910/0x1910 [ 323.804485] do_syscall_64+0x1b9/0x820 [ 323.808376] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 323.813751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 323.818683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.823533] ? trace_hardirqs_on_caller+0x310/0x310 [ 323.828568] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 323.833590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 323.838615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.843475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.848669] RIP: 0033:0x457669 [ 323.851886] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.870785] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 323.878494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457669 [ 323.885761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 323.893484] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 323.900752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 323.908017] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000003 05:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x5, {{0x2, 0x4e20, @broadcast}}}, 0x88) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000080)={{0x2, @name="06e233b469c87cf37e51835e2db38b62c777e1d47f5a60f333a2946441efe93d"}, 0x8, 0x9, 0x6}) 05:14:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000140)) dup3(r2, r1, 0x0) 05:14:47 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x2, 0x0) 05:14:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x1cf, 0xffffffff, 0x9, 0xea, 0x1b2, 0x6, 0x31a, 0x8}, "4eb3437a274f1a49", [[], [], [], [], [], [], [], []]}, 0x828) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) syncfs(r0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:47 executing program 2 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 324.397058] FAULT_INJECTION: forcing a failure. [ 324.397058] name failslab, interval 1, probability 0, space 0, times 0 [ 324.453819] CPU: 1 PID: 14359 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 324.461202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.470574] Call Trace: [ 324.470602] dump_stack+0x244/0x39d [ 324.470629] ? dump_stack_print_info.cold.1+0x20/0x20 [ 324.470676] should_fail.cold.4+0xa/0x17 [ 324.476934] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 324.491276] ? is_bpf_text_address+0xac/0x170 [ 324.495800] ? lock_downgrade+0x900/0x900 [ 324.499976] ? check_preemption_disabled+0x48/0x280 [ 324.505024] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 324.509963] ? kasan_check_read+0x11/0x20 [ 324.514124] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 324.519419] ? rcu_softirq_qs+0x20/0x20 [ 324.523423] ? rcu_softirq_qs+0x20/0x20 [ 324.527422] ? unwind_dump+0x190/0x190 [ 324.531333] ? is_bpf_text_address+0xd3/0x170 [ 324.535860] ? kernel_text_address+0x79/0xf0 [ 324.540326] ? perf_trace_sched_process_exec+0x860/0x860 [ 324.545814] __should_failslab+0x124/0x180 [ 324.550059] should_failslab+0x9/0x14 [ 324.553882] kmem_cache_alloc+0x2be/0x730 [ 324.558039] ? __shmem_file_setup.part.50+0x83/0x2a0 [ 324.563148] ? shmem_file_setup+0x65/0x90 [ 324.567303] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 324.572166] ? do_syscall_64+0x1b9/0x820 [ 324.576300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.581684] selinux_inode_alloc_security+0x107/0x3a0 [ 324.586916] ? inode_free_rcu+0x20/0x20 [ 324.590916] ? __put_user_ns+0x60/0x60 [ 324.594807] ? kasan_check_read+0x11/0x20 [ 324.598958] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 324.604247] ? lock_downgrade+0x900/0x900 [ 324.608420] security_inode_alloc+0x73/0xd0 [ 324.612756] inode_init_always+0x68f/0xd80 [ 324.617005] ? get_nr_inodes+0x120/0x120 [ 324.621093] ? rcu_pm_notify+0xc0/0xc0 [ 324.625005] ? rcu_read_lock_sched_held+0x14f/0x180 [ 324.630033] ? kmem_cache_alloc+0x33a/0x730 [ 324.634364] ? shmem_alloc_inode+0x1b/0x40 [ 324.638619] ? shmem_destroy_callback+0xc0/0xc0 [ 324.643314] alloc_inode+0x80/0x190 [ 324.646971] new_inode_pseudo+0x71/0x1a0 [ 324.651059] ? prune_icache_sb+0x1c0/0x1c0 [ 324.655309] ? _raw_spin_unlock+0x2c/0x50 [ 324.659472] new_inode+0x1c/0x40 [ 324.662849] shmem_get_inode+0xf1/0x920 [ 324.666837] ? shmem_encode_fh+0x340/0x340 [ 324.671086] ? lock_downgrade+0x900/0x900 [ 324.675251] ? lock_release+0xa00/0xa00 [ 324.679256] ? perf_trace_sched_process_exec+0x860/0x860 [ 324.684708] ? usercopy_warn+0x110/0x110 [ 324.688789] __shmem_file_setup.part.50+0x83/0x2a0 [ 324.693728] shmem_file_setup+0x65/0x90 [ 324.697710] __x64_sys_memfd_create+0x2af/0x4f0 [ 324.702385] ? memfd_fcntl+0x1910/0x1910 [ 324.706462] do_syscall_64+0x1b9/0x820 [ 324.710369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 324.715739] ? syscall_return_slowpath+0x5e0/0x5e0 [ 324.720677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.725525] ? trace_hardirqs_on_caller+0x310/0x310 [ 324.730541] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 324.735560] ? prepare_exit_to_usermode+0x291/0x3b0 [ 324.740585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.745452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.750679] RIP: 0033:0x457669 [ 324.753879] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.772906] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 324.780614] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457669 [ 324.787888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 324.795170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:14:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x80087601, 0x0) 05:14:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:48 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0x2, 0x5, 0x6, 0x4, 0x8}) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 324.802438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 324.809708] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000003 05:14:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100002}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="020027bd7000fddbdf250100000008000400010000004bb969c1698a8731927e17fb77bf368e6ee8897bf310cccc0adfec617f2bb7112f61eaf1c373ca2d02cc4328b34cdfbbc1e4c92732ba6961340709fc20e5d5202da7eb51fe267b3b5ba6fc57ff368b4e704e8f2e3daa1b951ad1a277ae00e6cdef126c5814b109"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = dup2(r0, r4) r6 = dup3(r4, r1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r5}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000040)={r7}) 05:14:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc0189436, 0x0) [ 324.970214] QAT: Invalid ioctl 05:14:48 executing program 2 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 325.003620] QAT: Invalid ioctl [ 325.111315] FAULT_INJECTION: forcing a failure. [ 325.111315] name failslab, interval 1, probability 0, space 0, times 0 [ 325.187327] CPU: 1 PID: 14389 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 325.194713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.204076] Call Trace: [ 325.206690] dump_stack+0x244/0x39d [ 325.210346] ? dump_stack_print_info.cold.1+0x20/0x20 [ 325.215571] should_fail.cold.4+0xa/0x17 [ 325.219667] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.224788] ? rcu_pm_notify+0xc0/0xc0 [ 325.228722] ? zap_class+0x640/0x640 [ 325.232450] ? memset+0x31/0x40 [ 325.235741] ? zap_class+0x640/0x640 [ 325.239471] ? find_held_lock+0x36/0x1c0 [ 325.243565] ? perf_trace_sched_process_exec+0x860/0x860 [ 325.249030] ? lock_downgrade+0x900/0x900 [ 325.253197] __should_failslab+0x124/0x180 [ 325.257464] should_failslab+0x9/0x14 [ 325.261280] kmem_cache_alloc+0x2be/0x730 [ 325.265450] __alloc_file+0xa8/0x470 [ 325.269176] ? file_free_rcu+0xd0/0xd0 [ 325.273080] ? d_instantiate+0x79/0xa0 [ 325.276979] ? lock_downgrade+0x900/0x900 [ 325.281162] ? kasan_check_read+0x11/0x20 [ 325.285359] ? do_raw_spin_unlock+0xa7/0x330 [ 325.289783] ? do_raw_spin_trylock+0x270/0x270 [ 325.294377] alloc_empty_file+0x72/0x170 [ 325.298457] alloc_file+0x5e/0x4d0 [ 325.302007] ? _raw_spin_unlock+0x2c/0x50 [ 325.306219] alloc_file_pseudo+0x261/0x3f0 [ 325.310470] ? alloc_file+0x4d0/0x4d0 [ 325.314282] ? usercopy_warn+0x110/0x110 [ 325.318375] __shmem_file_setup.part.50+0x110/0x2a0 [ 325.323427] shmem_file_setup+0x65/0x90 [ 325.327416] __x64_sys_memfd_create+0x2af/0x4f0 [ 325.332092] ? memfd_fcntl+0x1910/0x1910 [ 325.336168] do_syscall_64+0x1b9/0x820 [ 325.340061] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 325.345445] ? syscall_return_slowpath+0x5e0/0x5e0 [ 325.350394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.355252] ? trace_hardirqs_on_caller+0x310/0x310 [ 325.360308] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 325.365336] ? prepare_exit_to_usermode+0x291/0x3b0 [ 325.370367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.375227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.380425] RIP: 0033:0x457669 [ 325.383621] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.402546] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 325.410253] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457669 [ 325.417537] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 325.424875] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:14:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9205, 0x0) 05:14:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) dup3(r0, r3, 0x4080080000) 05:14:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2140, 0x0) [ 325.432142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 325.439409] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000003 05:14:48 executing program 2 (fault-call:0 fault-nth:5): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) mlockall(0x3) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x12480) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000080)=""/76) 05:14:48 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc0109207, 0x0) [ 325.655801] FAULT_INJECTION: forcing a failure. [ 325.655801] name failslab, interval 1, probability 0, space 0, times 0 [ 325.682382] CPU: 0 PID: 14416 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 325.689760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.699111] Call Trace: [ 325.701716] dump_stack+0x244/0x39d [ 325.705365] ? dump_stack_print_info.cold.1+0x20/0x20 [ 325.710598] ? is_bpf_text_address+0xd3/0x170 [ 325.715122] should_fail.cold.4+0xa/0x17 [ 325.719213] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.724334] ? save_stack+0xa9/0xd0 [ 325.727968] ? save_stack+0x43/0xd0 [ 325.731596] ? kasan_kmalloc+0xc7/0xe0 [ 325.735485] ? kasan_slab_alloc+0x12/0x20 [ 325.739664] ? kmem_cache_alloc+0x12e/0x730 [ 325.743987] ? __alloc_file+0xa8/0x470 [ 325.747873] ? alloc_empty_file+0x72/0x170 [ 325.752122] ? find_held_lock+0x36/0x1c0 [ 325.756211] ? perf_trace_sched_process_exec+0x860/0x860 [ 325.761943] ? check_preemption_disabled+0x48/0x280 [ 325.766985] __should_failslab+0x124/0x180 [ 325.771229] should_failslab+0x9/0x14 [ 325.775118] kmem_cache_alloc+0x2be/0x730 [ 325.779277] ? rcu_read_lock_sched_held+0x14f/0x180 [ 325.784301] selinux_file_alloc_security+0xb4/0x190 [ 325.789329] security_file_alloc+0x4c/0xa0 [ 325.793586] __alloc_file+0x12a/0x470 [ 325.797390] ? file_free_rcu+0xd0/0xd0 [ 325.801291] ? d_instantiate+0x79/0xa0 [ 325.805183] ? lock_downgrade+0x900/0x900 [ 325.809340] ? kasan_check_read+0x11/0x20 [ 325.813490] ? do_raw_spin_unlock+0xa7/0x330 [ 325.817897] ? do_raw_spin_trylock+0x270/0x270 [ 325.822494] alloc_empty_file+0x72/0x170 [ 325.826555] alloc_file+0x5e/0x4d0 [ 325.830121] ? _raw_spin_unlock+0x2c/0x50 [ 325.834274] alloc_file_pseudo+0x261/0x3f0 [ 325.838532] ? alloc_file+0x4d0/0x4d0 [ 325.842353] ? usercopy_warn+0x110/0x110 [ 325.846438] __shmem_file_setup.part.50+0x110/0x2a0 [ 325.851464] shmem_file_setup+0x65/0x90 [ 325.855444] __x64_sys_memfd_create+0x2af/0x4f0 [ 325.860115] ? memfd_fcntl+0x1910/0x1910 [ 325.864191] do_syscall_64+0x1b9/0x820 [ 325.868079] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 325.873446] ? syscall_return_slowpath+0x5e0/0x5e0 [ 325.878375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.883222] ? trace_hardirqs_on_caller+0x310/0x310 [ 325.888244] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 325.893270] ? prepare_exit_to_usermode+0x291/0x3b0 [ 325.898294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.903149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.908339] RIP: 0033:0x457669 [ 325.911564] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.930477] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 325.938186] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457669 [ 325.945471] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc5a2 05:14:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x48000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000000)=""/84) dup3(r2, r1, 0x0) [ 325.952769] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.960051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 325.967333] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000003 05:14:49 executing program 2 (fault-call:0 fault-nth:6): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 326.167863] FAULT_INJECTION: forcing a failure. [ 326.167863] name failslab, interval 1, probability 0, space 0, times 0 [ 326.179472] CPU: 1 PID: 14430 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 326.186843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.196220] Call Trace: [ 326.198826] dump_stack+0x244/0x39d [ 326.198853] ? dump_stack_print_info.cold.1+0x20/0x20 [ 326.198902] should_fail.cold.4+0xa/0x17 [ 326.211746] ? find_held_lock+0x36/0x1c0 [ 326.215825] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.220943] ? lock_downgrade+0x900/0x900 [ 326.220961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.220981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.236226] ? timespec64_trunc+0xea/0x180 [ 326.240467] ? inode_init_owner+0x340/0x340 [ 326.244799] ? find_held_lock+0x36/0x1c0 [ 326.248887] ? perf_trace_sched_process_exec+0x860/0x860 [ 326.254344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.259894] __should_failslab+0x124/0x180 [ 326.264134] should_failslab+0x9/0x14 [ 326.267935] kmem_cache_alloc+0x2be/0x730 [ 326.272089] ? do_sys_ftruncate+0x428/0x550 [ 326.276425] ? lock_downgrade+0x900/0x900 [ 326.280583] getname_flags+0xd0/0x590 [ 326.284385] ? __lock_is_held+0xb5/0x140 [ 326.288457] getname+0x19/0x20 [ 326.291657] do_sys_open+0x383/0x700 [ 326.295378] ? filp_open+0x80/0x80 [ 326.298942] ? trace_hardirqs_off_caller+0x310/0x310 [ 326.304039] ? do_sys_ftruncate+0x449/0x550 [ 326.308368] __x64_sys_open+0x7e/0xc0 [ 326.312177] do_syscall_64+0x1b9/0x820 [ 326.316061] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 326.321430] ? syscall_return_slowpath+0x5e0/0x5e0 [ 326.326357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.331222] ? trace_hardirqs_on_caller+0x310/0x310 [ 326.336270] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 326.341299] ? prepare_exit_to_usermode+0x291/0x3b0 [ 326.346319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.351193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.356376] RIP: 0033:0x4112a1 [ 326.359588] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 326.378481] RSP: 002b:00007fce7cd3ea10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 326.386198] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004112a1 [ 326.393473] RDX: 00007fce7cd3ebaa RSI: 0000000000000002 RDI: 00007fce7cd3eba0 [ 326.400735] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 326.408013] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000000 [ 326.415279] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000000000003 05:14:50 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:50 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x541b, 0x0) 05:14:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:50 executing program 2 (fault-call:0 fault-nth:7): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) dup3(r2, r1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000000)=0x6, 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000140)={0x9b0000, 0x6, 0x9, [], &(0x7f00000000c0)={0x990a2d, 0x3ff, [], @string=&(0x7f0000000040)=0x5}}) 05:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000003c0), 0x4) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="6d02dc525dbe646b4b86167bcffac845826a332887ffe57cc91b1cb9f97ee223d6486f96bad9dc1029af1d7950828e4cb017d027f6aa1177d5c612c957ba2d743e96b241feb25e1cc0d32234e189fb53888595c704007a8d3176f8b0783afb593d9a9d8299fc2fa95189ee1175ffab77e8c164b49cc68fe8cb8aa088dff1d34aa7195b00"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x0) prctl$PR_GET_SECUREBITS(0x1b) socket$bt_hidp(0x1f, 0x3, 0x6) semget$private(0x0, 0x0, 0xe4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x840, 0x0) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@random={'user.', '/dev/sequencer\x00'}, &(0x7f0000000300)=""/183, 0xb7) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000180)={0x0, 0xff, 0x9, &(0x7f0000000140)=0x4}) fsync(r0) [ 326.815388] FAULT_INJECTION: forcing a failure. [ 326.815388] name failslab, interval 1, probability 0, space 0, times 0 [ 326.860031] CPU: 1 PID: 14447 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 326.867410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.876763] Call Trace: [ 326.879355] dump_stack+0x244/0x39d [ 326.882988] ? dump_stack_print_info.cold.1+0x20/0x20 [ 326.888751] should_fail.cold.4+0xa/0x17 [ 326.892822] ? find_held_lock+0x36/0x1c0 [ 326.896905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.902037] ? lock_downgrade+0x900/0x900 [ 326.906186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.911750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.917291] ? timespec64_trunc+0xea/0x180 [ 326.921526] ? inode_init_owner+0x340/0x340 [ 326.925870] ? find_held_lock+0x36/0x1c0 [ 326.929968] ? perf_trace_sched_process_exec+0x860/0x860 [ 326.935420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.940970] __should_failslab+0x124/0x180 [ 326.945211] should_failslab+0x9/0x14 [ 326.949013] kmem_cache_alloc+0x2be/0x730 [ 326.953157] ? do_sys_ftruncate+0x428/0x550 [ 326.957497] ? lock_downgrade+0x900/0x900 [ 326.961661] getname_flags+0xd0/0x590 [ 326.965461] ? __lock_is_held+0xb5/0x140 [ 326.969530] getname+0x19/0x20 [ 326.972723] do_sys_open+0x383/0x700 [ 326.976444] ? filp_open+0x80/0x80 [ 326.979990] ? trace_hardirqs_off_caller+0x310/0x310 [ 326.985112] ? do_sys_ftruncate+0x449/0x550 [ 326.989449] __x64_sys_open+0x7e/0xc0 [ 326.993268] do_syscall_64+0x1b9/0x820 [ 326.997152] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.002521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.007469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.012312] ? trace_hardirqs_on_caller+0x310/0x310 [ 327.017328] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.022377] ? prepare_exit_to_usermode+0x291/0x3b0 [ 327.027424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.032275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.037464] RIP: 0033:0x4112a1 [ 327.040667] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 05:14:50 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc0045878, 0x0) 05:14:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 327.059565] RSP: 002b:00007fce7cd3ea10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 327.067273] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004112a1 [ 327.074539] RDX: 00007fce7cd3ebaa RSI: 0000000000000002 RDI: 00007fce7cd3eba0 [ 327.081812] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 327.089105] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000000 [ 327.096369] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000000000003 05:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0101000000003da48e75cf00409d925487b13c0e3c64302356b403e6215a571dac431fff9b47b6817f414237bcd9a81de523db512ab87c3da3a5ec89392b5f6f5663a8db17fa6f213071301b2a4ca5db17b5fb06d213b68d2701004e5ab6dfb0d12cbb693000479b370d69b61660db9a738c781716f126dddc27c029091b0843b2bb9bbacd248f6d916c58c011a1d8a7c9d9bf71232c623073788daed5a08d5e2faf0d39085f44d8eac372a195c6c9abdf9b19514115458a9295ea64c49f9a307ca8375ff7651eee8d8edca0c07f44a5c42261", 0xd3) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000a80)) dup2(r0, r2) dup3(r0, r1, 0x0) 05:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'yam0\x00', 0x5}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:50 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x4018920a, 0x0) 05:14:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x48, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x5450, 0x0) 05:14:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) read(r2, &(0x7f0000001240)=""/28, 0x1c) close(r2) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x1000000000013) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 05:14:51 executing program 4: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '\xf6'}, {0x20, 'ghash\x00'}], 0xa, "5592e3a49c8b386ce06b79ae1bd7d02fdd2dcb766d3a4f"}, 0x2b) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1, 0xc0000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000100)={0xff, @remote, 0x4e22, 0x3, 'lblcr\x00', 0x2, 0x2, 0x1}, 0x2c) r3 = msgget(0x1, 0x2c0) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000002c0)=""/199) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0xf) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:51 executing program 2 (fault-call:0 fault-nth:8): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 327.780025] FAULT_INJECTION: forcing a failure. [ 327.780025] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 327.791876] CPU: 0 PID: 14495 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 327.799294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.808682] Call Trace: [ 327.811293] dump_stack+0x244/0x39d [ 327.814949] ? dump_stack_print_info.cold.1+0x20/0x20 [ 327.820190] should_fail.cold.4+0xa/0x17 [ 327.824287] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.829400] ? lock_downgrade+0x900/0x900 [ 327.833562] ? check_preemption_disabled+0x48/0x280 [ 327.838597] ? mark_held_locks+0x130/0x130 [ 327.842844] ? zap_class+0x640/0x640 [ 327.846572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.852117] ? avc_has_perm+0x55f/0x7e0 [ 327.856120] ? zap_class+0x640/0x640 [ 327.859849] ? avc_has_perm_noaudit+0x630/0x630 [ 327.864539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.870084] ? should_fail+0x22d/0xd01 [ 327.873972] ? find_held_lock+0x36/0x1c0 [ 327.878061] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.883180] __alloc_pages_nodemask+0x366/0xea0 [ 327.887862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.893409] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 327.898437] ? inode_init_owner+0x340/0x340 [ 327.902775] ? find_held_lock+0x36/0x1c0 [ 327.906875] ? trace_hardirqs_off+0xb8/0x310 [ 327.911301] cache_grow_begin+0xa5/0x8c0 [ 327.915371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.920925] ? check_preemption_disabled+0x48/0x280 [ 327.925977] kmem_cache_alloc+0x66b/0x730 [ 327.930135] ? do_sys_ftruncate+0x428/0x550 [ 327.934480] getname_flags+0xd0/0x590 [ 327.938303] ? __lock_is_held+0xb5/0x140 [ 327.942379] getname+0x19/0x20 [ 327.945587] do_sys_open+0x383/0x700 [ 327.949314] ? filp_open+0x80/0x80 [ 327.952868] ? trace_hardirqs_off_caller+0x310/0x310 [ 327.957987] ? do_sys_ftruncate+0x449/0x550 [ 327.962323] __x64_sys_open+0x7e/0xc0 [ 327.966137] do_syscall_64+0x1b9/0x820 [ 327.970041] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.975433] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.980373] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.985229] ? trace_hardirqs_on_caller+0x310/0x310 [ 327.990265] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.995294] ? prepare_exit_to_usermode+0x291/0x3b0 [ 328.000345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.005208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.010404] RIP: 0033:0x4112a1 05:14:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 328.013613] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 328.032528] RSP: 002b:00007fce7cd3ea10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 328.040247] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004112a1 [ 328.047528] RDX: 00007fce7cd3ebaa RSI: 0000000000000002 RDI: 00007fce7cd3eba0 [ 328.054807] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 328.062084] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000000 [ 328.069357] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000000000003 05:14:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x5421, 0x0) 05:14:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x3) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f00000002c0)=""/181) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x401, 0x3, 0x1, 0x4, 0x7, 0x4, 0x7, 0x2, r3}, &(0x7f0000000180)=0x20) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 328.170888] audit: type=1804 audit(1545369291.470:56): pid=14512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir646941734/syzkaller.cmdm9C/235/file0" dev="sda1" ino=17326 res=1 [ 328.253359] QAT: Invalid ioctl 05:14:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:51 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40049409, 0x0) [ 328.275208] QAT: Invalid ioctl [ 328.282211] audit: type=1804 audit(1545369291.560:57): pid=14512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir646941734/syzkaller.cmdm9C/235/file0" dev="sda1" ino=17326 res=1 [ 328.308975] QAT: Invalid ioctl [ 328.312788] QAT: Invalid ioctl 05:14:51 executing program 2 (fault-call:0 fault-nth:9): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 328.374472] audit: type=1804 audit(1545369291.590:58): pid=14512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir646941734/syzkaller.cmdm9C/235/file0" dev="sda1" ino=17326 res=1 [ 328.516992] FAULT_INJECTION: forcing a failure. [ 328.516992] name failslab, interval 1, probability 0, space 0, times 0 [ 328.563151] CPU: 0 PID: 14534 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 328.570532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.579883] Call Trace: [ 328.582487] dump_stack+0x244/0x39d [ 328.586140] ? dump_stack_print_info.cold.1+0x20/0x20 [ 328.591340] ? is_bpf_text_address+0xd3/0x170 [ 328.595850] should_fail.cold.4+0xa/0x17 [ 328.599928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 328.605048] ? save_stack+0xa9/0xd0 [ 328.608681] ? save_stack+0x43/0xd0 [ 328.612313] ? kasan_kmalloc+0xc7/0xe0 [ 328.616199] ? kasan_slab_alloc+0x12/0x20 [ 328.620349] ? kmem_cache_alloc+0x12e/0x730 [ 328.624682] ? __alloc_file+0xa8/0x470 [ 328.628572] ? alloc_empty_file+0x72/0x170 [ 328.632815] ? find_held_lock+0x36/0x1c0 [ 328.636900] ? perf_trace_sched_process_exec+0x860/0x860 [ 328.642365] ? check_preemption_disabled+0x48/0x280 [ 328.647391] __should_failslab+0x124/0x180 [ 328.651654] should_failslab+0x9/0x14 [ 328.655462] kmem_cache_alloc+0x2be/0x730 [ 328.659632] ? rcu_read_lock_sched_held+0x14f/0x180 [ 328.664712] selinux_file_alloc_security+0xb4/0x190 [ 328.669737] security_file_alloc+0x4c/0xa0 [ 328.673975] __alloc_file+0x12a/0x470 [ 328.677778] ? file_free_rcu+0xd0/0xd0 [ 328.681690] ? find_held_lock+0x36/0x1c0 [ 328.685770] ? is_bpf_text_address+0xac/0x170 [ 328.690267] ? lock_downgrade+0x900/0x900 [ 328.694416] ? check_preemption_disabled+0x48/0x280 [ 328.699440] alloc_empty_file+0x72/0x170 [ 328.703512] path_openat+0x170/0x5150 [ 328.707333] ? rcu_softirq_qs+0x20/0x20 [ 328.711305] ? unwind_dump+0x190/0x190 [ 328.715204] ? zap_class+0x640/0x640 [ 328.718944] ? path_lookupat.isra.43+0xc00/0xc00 [ 328.723702] ? unwind_get_return_address+0x61/0xa0 [ 328.728637] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 328.733678] ? expand_files.part.8+0x571/0x9a0 [ 328.738269] ? find_held_lock+0x36/0x1c0 [ 328.742353] ? __alloc_fd+0x347/0x6e0 [ 328.746158] ? lock_downgrade+0x900/0x900 [ 328.750325] ? getname+0x19/0x20 [ 328.753715] ? kasan_check_read+0x11/0x20 [ 328.758106] ? do_raw_spin_unlock+0xa7/0x330 [ 328.762521] ? do_raw_spin_trylock+0x270/0x270 [ 328.767109] ? __lock_is_held+0xb5/0x140 [ 328.771174] ? __check_object_size+0xb1/0x782 [ 328.775696] ? _raw_spin_unlock+0x2c/0x50 [ 328.779845] ? __alloc_fd+0x347/0x6e0 [ 328.783700] do_filp_open+0x255/0x380 [ 328.787517] ? may_open_dev+0x100/0x100 [ 328.791522] ? get_unused_fd_flags+0x122/0x1a0 [ 328.796106] ? __alloc_fd+0x6e0/0x6e0 [ 328.799919] ? __lock_is_held+0xb5/0x140 [ 328.804008] do_sys_open+0x568/0x700 [ 328.807730] ? filp_open+0x80/0x80 [ 328.811336] ? trace_hardirqs_off_caller+0x310/0x310 [ 328.816435] ? do_sys_ftruncate+0x449/0x550 [ 328.820758] __x64_sys_open+0x7e/0xc0 [ 328.824561] do_syscall_64+0x1b9/0x820 [ 328.828445] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 328.833822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 328.838763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.843607] ? trace_hardirqs_on_caller+0x310/0x310 [ 328.848625] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 328.853662] ? prepare_exit_to_usermode+0x291/0x3b0 [ 328.858686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.863548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.868753] RIP: 0033:0x4112a1 [ 328.871946] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 328.890945] RSP: 002b:00007fce7cd3ea10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 328.898661] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004112a1 [ 328.905931] RDX: 00007fce7cd3ebaa RSI: 0000000000000002 RDI: 00007fce7cd3eba0 [ 328.913195] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 328.920455] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000000 [ 328.927716] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000000000003 05:14:52 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @remote}, &(0x7f0000000080)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000000c0)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, r2}, 0x14) 05:14:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) dup3(r2, r0, 0x80000) fcntl$getflags(r1, 0x401) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) setuid(r4) 05:14:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x80086601, 0x0) 05:14:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc020660b, 0x0) 05:14:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xedc0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x1c, 0x18, {0x3, @bearer=@l2={'eth', 0x3a, 'veth0_to_team\x00'}}}}, ["", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) 05:14:52 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, 0x0) 05:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x80) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000140)={0x2, r3}) r4 = fcntl$dupfd(r1, 0x406, r0) ioctl$EVIOCGABS0(r4, 0x80184540, &(0x7f00000002c0)=""/4096) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000000)={@local, @multicast2}, &(0x7f0000000080)=0xc) 05:14:53 executing program 2 (fault-call:0 fault-nth:10): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 329.835818] FAULT_INJECTION: forcing a failure. [ 329.835818] name failslab, interval 1, probability 0, space 0, times 0 [ 329.847307] CPU: 1 PID: 14582 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 329.854694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.864095] Call Trace: [ 329.866717] dump_stack+0x244/0x39d [ 329.870380] ? dump_stack_print_info.cold.1+0x20/0x20 [ 329.875599] should_fail.cold.4+0xa/0x17 [ 329.879681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 329.884809] ? down_write_nested+0x130/0x130 [ 329.889268] ? down_read+0x120/0x120 [ 329.893029] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 329.898588] ? zap_class+0x640/0x640 [ 329.902302] ? lock_acquire+0x1ed/0x520 [ 329.906279] ? lo_ioctl+0x8e/0x1d60 [ 329.909934] ? find_held_lock+0x36/0x1c0 [ 329.914007] ? __lock_is_held+0xb5/0x140 [ 329.918086] ? print_tickdevice.isra.4+0x618/0x690 [ 329.923036] ? perf_trace_sched_process_exec+0x860/0x860 [ 329.928516] __should_failslab+0x124/0x180 [ 329.932778] should_failslab+0x9/0x14 [ 329.936592] kmem_cache_alloc_trace+0x2d7/0x750 [ 329.941271] ? check_preemption_disabled+0x48/0x280 [ 329.946308] __kthread_create_on_node+0x137/0x540 [ 329.951159] ? loop_get_status64+0x140/0x140 [ 329.955572] ? kthread_parkme+0xb0/0xb0 [ 329.959566] ? __lockdep_init_map+0x105/0x590 [ 329.964116] ? __lockdep_init_map+0x105/0x590 [ 329.968621] ? loop_get_status64+0x140/0x140 [ 329.973058] kthread_create_on_node+0xb1/0xe0 [ 329.977562] ? __kthread_create_on_node+0x540/0x540 [ 329.982609] ? kasan_check_read+0x11/0x20 [ 329.986745] lo_ioctl+0x7f6/0x1d60 [ 329.990271] ? lo_rw_aio+0x1ef0/0x1ef0 [ 329.994139] blkdev_ioctl+0xd8a/0x21b0 [ 329.998038] ? blkpg_ioctl+0xc10/0xc10 [ 330.001926] ? avc_ss_reset+0x190/0x190 [ 330.005901] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 330.010816] ? kasan_check_read+0x11/0x20 [ 330.014945] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 330.020200] ? rcu_softirq_qs+0x20/0x20 [ 330.024184] ? perf_trace_sched_process_exec+0x860/0x860 [ 330.029620] block_ioctl+0xee/0x130 [ 330.033236] ? blkdev_fallocate+0x400/0x400 [ 330.037536] do_vfs_ioctl+0x1de/0x1790 [ 330.041431] ? ioctl_preallocate+0x300/0x300 [ 330.045826] ? selinux_file_mprotect+0x620/0x620 [ 330.050569] ? rcu_read_lock_sched_held+0x14f/0x180 [ 330.055566] ? kmem_cache_free+0x1fb/0x290 [ 330.059787] ? putname+0xf7/0x130 [ 330.063225] ? do_syscall_64+0x9a/0x820 [ 330.067185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.072705] ? security_file_ioctl+0x94/0xc0 [ 330.077100] ksys_ioctl+0xa9/0xd0 [ 330.080539] __x64_sys_ioctl+0x73/0xb0 [ 330.084414] do_syscall_64+0x1b9/0x820 [ 330.088281] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 330.093628] ? syscall_return_slowpath+0x5e0/0x5e0 [ 330.098546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.103373] ? trace_hardirqs_on_caller+0x310/0x310 [ 330.108370] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 330.113371] ? prepare_exit_to_usermode+0x291/0x3b0 [ 330.118371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.123213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.128384] RIP: 0033:0x4574d7 [ 330.131567] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.150450] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.158135] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 330.165385] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 330.172649] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 330.179917] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 05:14:53 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:14:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:53 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x4b49, 0x0) 05:14:53 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000100)={0x6, 0x0, 'client0\x00', 0x1, "e9684b421def7c48", "2d2ed4fad19c0c8cd6627fe5eb2d71973fff519f7c1ba6eac2d220057458b054", 0xfffffffffffffffa, 0x5}) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000003c0)={0x0, 0x3e, "65eec4e07d4e1ace05a9bc4aecf49fd5c871a8e953748b88d8f5166a8869cae29bfeee4d644f3e30a0230e57ff1e8259e1b3eb749d4d94ef900a0116a862"}, &(0x7f0000000440)=0x46) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000480)={0x0, 0x1000, 0x7f, 0x3, 0x3, 0x401, 0x5, 0x4, {0x0, @in6={{0xa, 0x4e21, 0x7fff, @loopback, 0x3}}, 0x3, 0x5, 0x0, 0x3, 0x5}}, &(0x7f0000000680)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e20, 0x7fffffff, @mcast1, 0x8}}, 0x3, 0x401}, &(0x7f0000000640)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x80000001}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={r3, 0x2, 0x5, 0x3}, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000240)={0x6, 0xffff, 0x6, 0x4000, r1}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x800) ioctl$VIDIOC_SUBDEV_S_SELECTION(r4, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x100, 0x1, {0x6, 0x6, 0x1, 0x3467}}) 05:14:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)='/dev/kvm\x00', 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000280)='/dev/kvm\x00') r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r3 = dup3(r2, r2, 0x80000) mq_timedsend(r3, &(0x7f0000000140)="5a18929daee652f9324e456f8e54d9604fbe1234a0d98b5e2d686a1b4cf411b21a280e2ebf9fec444ae75c9c404a1c4b275de570bd5a173a69622cb3e02d4834383aca36ded020ce5b82a049d47c092c120078a3441cace196235a37509a3d77f30c64c6ad0356b177bc01c6219c76b897648d4b973bc107f77b20c5cffcfe8716894e3cc1", 0x85, 0xd0, &(0x7f0000000000)={0x0, 0x1c9c380}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = dup2(r0, r4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) dup3(r4, r2, 0x0) [ 330.187164] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4c, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:53 executing program 2 (fault-call:0 fault-nth:11): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x7) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:53 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x5452, 0x0) 05:14:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x20, &(0x7f0000000140)='/dev/kvm\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e24, 0x800, @ipv4={[], [], @broadcast}, 0x2}}, 0x0, 0x17bb, 0x0, "19dbe3ceba18b1c523a7cc1da9a61c46045a50892ea2847725b46b01b846e5ea7e9b8a3fda27992fe41c96439ba7390d362fa7dd6c01b20102d1a3242e3c31dd7b93758451212ac845c29b3025315c7e"}, 0xd8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) [ 330.420783] FAULT_INJECTION: forcing a failure. [ 330.420783] name failslab, interval 1, probability 0, space 0, times 0 [ 330.442973] CPU: 1 PID: 14605 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 330.450345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.459704] Call Trace: [ 330.459730] dump_stack+0x244/0x39d [ 330.459752] ? dump_stack_print_info.cold.1+0x20/0x20 05:14:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 330.459785] should_fail.cold.4+0xa/0x17 [ 330.475256] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.480391] ? pick_next_task_fair+0xa05/0x1b30 [ 330.485079] ? rcu_read_lock_sched_held+0x14f/0x180 [ 330.490117] ? zap_class+0x640/0x640 [ 330.493846] ? print_usage_bug+0xc0/0xc0 [ 330.497935] ? find_held_lock+0x36/0x1c0 [ 330.502062] ? __lock_is_held+0xb5/0x140 [ 330.506143] ? reweight_entity+0x10f0/0x10f0 [ 330.510576] ? perf_trace_sched_process_exec+0x860/0x860 [ 330.516090] __should_failslab+0x124/0x180 05:14:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f00000002c0)={{0x4, 0x0, 0x7, 0x20, 'syz0\x00', 0xfff}, 0x0, 0x10000040, 0x1, r3, 0x9, 0x3ff, 'syz1\x00', &(0x7f0000000100)=['[vmnet0\\wlan1cgroup\x00', '/loppp0selinux/}\xe4ppp1\x00', 'ghash\x00', 'wlan0vmnet1\x00', 'hash\x00', 'user\x00', 'ghash\x00', 'ghash\x00', '\x00'], 0x53, [], [0x8, 0xa1, 0x80000000, 0x6]}) [ 330.520357] should_failslab+0x9/0x14 [ 330.524165] kmem_cache_alloc+0x2be/0x730 [ 330.528322] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 330.533356] __kernfs_new_node+0x127/0x8d0 [ 330.537610] ? trace_hardirqs_off_caller+0x310/0x310 [ 330.542738] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 330.547528] ? _raw_spin_unlock_irq+0x60/0x80 [ 330.552035] ? __schedule+0x168a/0x21d0 [ 330.556023] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 330.561131] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 330.566262] ? zap_class+0x640/0x640 [ 330.569990] ? zap_class+0x640/0x640 [ 330.573715] ? enqueue_task_fair+0x24d/0xa50 [ 330.578134] ? find_held_lock+0x36/0x1c0 [ 330.582223] kernfs_new_node+0x95/0x120 [ 330.586212] kernfs_create_dir_ns+0x4d/0x160 [ 330.590668] internal_create_group+0x5fc/0xd80 [ 330.595274] ? remove_files.isra.1+0x190/0x190 [ 330.599864] ? up_write+0x7b/0x220 [ 330.603423] ? down_write_nested+0x130/0x130 [ 330.607845] ? down_read+0x120/0x120 [ 330.611588] sysfs_create_group+0x1f/0x30 [ 330.615749] lo_ioctl+0x1307/0x1d60 [ 330.619396] ? lo_rw_aio+0x1ef0/0x1ef0 [ 330.623302] blkdev_ioctl+0xd8a/0x21b0 [ 330.627244] ? blkpg_ioctl+0xc10/0xc10 [ 330.631184] ? avc_ss_reset+0x190/0x190 [ 330.635176] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 330.640116] ? kasan_check_read+0x11/0x20 [ 330.644274] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 330.649557] ? rcu_softirq_qs+0x20/0x20 [ 330.649600] ? perf_trace_sched_process_exec+0x860/0x860 [ 330.649623] block_ioctl+0xee/0x130 [ 330.649650] ? blkdev_fallocate+0x400/0x400 [ 330.659060] do_vfs_ioctl+0x1de/0x1790 [ 330.659083] ? ioctl_preallocate+0x300/0x300 [ 330.659104] ? selinux_file_mprotect+0x620/0x620 [ 330.659126] ? rcu_read_lock_sched_held+0x14f/0x180 [ 330.659142] ? kmem_cache_free+0x1fb/0x290 [ 330.659162] ? putname+0xf7/0x130 [ 330.692816] ? do_syscall_64+0x9a/0x820 [ 330.696863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.702417] ? security_file_ioctl+0x94/0xc0 [ 330.706855] ksys_ioctl+0xa9/0xd0 [ 330.710327] __x64_sys_ioctl+0x73/0xb0 [ 330.714230] do_syscall_64+0x1b9/0x820 [ 330.718130] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 330.723526] ? syscall_return_slowpath+0x5e0/0x5e0 [ 330.728461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.733308] ? trace_hardirqs_on_caller+0x310/0x310 [ 330.738372] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 330.743431] ? prepare_exit_to_usermode+0x291/0x3b0 [ 330.748452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.753304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.758591] RIP: 0033:0x4574d7 [ 330.761786] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.780684] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.788388] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 330.795694] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 330.802979] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 330.810260] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 330.817540] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:54 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 05:14:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x5460, 0x0) 05:14:54 executing program 4: io_setup(0x3, &(0x7f0000000000)=0x0) io_destroy(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9208, 0x0) 05:14:54 executing program 2 (fault-call:0 fault-nth:12): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x400000) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e22, 0xe7, @empty, 0x88e5}}, 0x0, 0x1000, 0x0, "0d79133a68392bc458f62d6d89d595737ae89a79368ba6268a0b44d76313d78016aad63f54d6f3a7b933481503991178db918be1a509370cebb133c94691eff2850c6b4da67fca5a878cba9faad4e727"}, 0xd8) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="aa6cf794f4a57b1245de161688578457b4eae07c9a70da7fb166fc2495e782ecd08285d0279b0bc0f0cc844a15f8"], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 331.112333] FAULT_INJECTION: forcing a failure. [ 331.112333] name failslab, interval 1, probability 0, space 0, times 0 [ 331.124244] CPU: 1 PID: 14651 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 331.131620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.140987] Call Trace: [ 331.143596] dump_stack+0x244/0x39d [ 331.147251] ? dump_stack_print_info.cold.1+0x20/0x20 [ 331.152472] should_fail.cold.4+0xa/0x17 [ 331.156554] ? fault_create_debugfs_attr+0x1f0/0x1f0 05:14:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 331.161711] ? pick_next_task_fair+0xa05/0x1b30 [ 331.166398] ? rcu_read_lock_sched_held+0x14f/0x180 [ 331.171447] ? zap_class+0x640/0x640 [ 331.175180] ? print_usage_bug+0xc0/0xc0 [ 331.179275] ? find_held_lock+0x36/0x1c0 [ 331.183352] ? __lock_is_held+0xb5/0x140 [ 331.187446] ? reweight_entity+0x10f0/0x10f0 [ 331.191869] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.197345] __should_failslab+0x124/0x180 [ 331.201602] should_failslab+0x9/0x14 [ 331.205417] kmem_cache_alloc+0x2be/0x730 05:14:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r2, r1) dup3(r2, r1, 0x0) [ 331.209589] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 331.214634] __kernfs_new_node+0x127/0x8d0 [ 331.218899] ? trace_hardirqs_off_caller+0x310/0x310 [ 331.224016] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 331.228793] ? _raw_spin_unlock_irq+0x60/0x80 [ 331.228811] ? __schedule+0x168a/0x21d0 [ 331.228825] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 331.228840] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 331.228859] ? zap_class+0x640/0x640 [ 331.237320] ? zap_class+0x640/0x640 [ 331.254952] ? enqueue_task_fair+0x24d/0xa50 05:14:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 331.259375] ? find_held_lock+0x36/0x1c0 [ 331.263469] kernfs_new_node+0x95/0x120 [ 331.267454] kernfs_create_dir_ns+0x4d/0x160 [ 331.271890] internal_create_group+0x5fc/0xd80 [ 331.276505] ? remove_files.isra.1+0x190/0x190 [ 331.281119] ? up_write+0x7b/0x220 [ 331.284700] ? down_write_nested+0x130/0x130 [ 331.289139] ? down_read+0x120/0x120 [ 331.289170] sysfs_create_group+0x1f/0x30 [ 331.289187] lo_ioctl+0x1307/0x1d60 [ 331.289211] ? lo_rw_aio+0x1ef0/0x1ef0 [ 331.297082] blkdev_ioctl+0xd8a/0x21b0 [ 331.308455] ? blkpg_ioctl+0xc10/0xc10 [ 331.312367] ? avc_ss_reset+0x190/0x190 [ 331.316359] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 331.321296] ? kasan_check_read+0x11/0x20 [ 331.325455] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 331.330744] ? rcu_softirq_qs+0x20/0x20 [ 331.334753] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.340222] block_ioctl+0xee/0x130 [ 331.343858] ? blkdev_fallocate+0x400/0x400 [ 331.348192] do_vfs_ioctl+0x1de/0x1790 [ 331.352100] ? ioctl_preallocate+0x300/0x300 [ 331.356514] ? selinux_file_mprotect+0x620/0x620 [ 331.361294] ? rcu_read_lock_sched_held+0x14f/0x180 [ 331.366311] ? kmem_cache_free+0x1fb/0x290 [ 331.370547] ? putname+0xf7/0x130 [ 331.374003] ? do_syscall_64+0x9a/0x820 [ 331.377979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.383516] ? security_file_ioctl+0x94/0xc0 [ 331.387924] ksys_ioctl+0xa9/0xd0 [ 331.391394] __x64_sys_ioctl+0x73/0xb0 [ 331.395300] do_syscall_64+0x1b9/0x820 [ 331.399184] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 331.404546] ? syscall_return_slowpath+0x5e0/0x5e0 [ 331.409476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.414320] ? trace_hardirqs_on_caller+0x310/0x310 [ 331.419354] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 331.424385] ? prepare_exit_to_usermode+0x291/0x3b0 [ 331.429409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.434283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.439482] RIP: 0033:0x4574d7 [ 331.442683] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:14:54 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x4b47, 0x0) [ 331.461580] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 331.469283] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 331.476545] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 331.483818] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 331.491099] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 331.498380] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="0101000004000000a33b052dabbb56c2d0844399d704000000409d9254a4ed19e447d472011095f8466d74c1ee03aa609a8326232eaade0c6f38449e983c6daea12c003b15cc5cd79d71834b988b76931c35b4031d67b655c46b03a25580be3f902f84cbc9000000000000000803c7d17e3c933431a25d85c6abce902d014e493ff6b209a3e51df40e7bfe5aac11d83131d6229fb538f55e062f6a28256b4f26e65f6547bfc5c1eaf5b25c5392d0181522cec99c2e51f6f890ea64109bd1e1b0461034a6b5d8b0130c8d3ffdefd68a55278f5d603804888bffde3eee8bcf5ea0d907b0a52605066d000000000000000000", 0xfffffffffffffe5f) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)={0x5, 0x0, [{0xc0000004, 0x754e, 0x4, 0x9, 0x8001, 0x0, 0x4}, {0x4, 0xffffffffffffffff, 0x4, 0x6, 0x0, 0x80, 0xffff}, {0x40000000, 0x1, 0x2, 0x0, 0x80000000, 0x0, 0x100}, {0xc000001d, 0x2d94, 0x0, 0x9, 0x400000000000000, 0x2, 0x20}, {0x6, 0x7, 0x0, 0x0, 0xb0d2, 0x4, 0x3}]}) bind$alg(r1, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:55 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 05:14:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40087602, 0x0) 05:14:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:55 executing program 2 (fault-call:0 fault-nth:13): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2440607aa098c160548285fa33443b1d3e67af55db273bd17b44408754cf2bbe45ea202ae32c"], 0x1}}, 0x0) 05:14:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 331.854516] FAULT_INJECTION: forcing a failure. [ 331.854516] name failslab, interval 1, probability 0, space 0, times 0 [ 331.908834] CPU: 0 PID: 14685 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 331.916221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.925589] Call Trace: [ 331.928240] dump_stack+0x244/0x39d [ 331.931914] ? dump_stack_print_info.cold.1+0x20/0x20 [ 331.937118] ? radix_tree_tag_set+0x3d0/0x3d0 [ 331.941664] should_fail.cold.4+0xa/0x17 [ 331.941689] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 331.950847] ? kernfs_activate+0x8e/0x2c0 [ 331.955009] ? zap_class+0x640/0x640 [ 331.958730] ? lock_release+0xa00/0xa00 [ 331.962719] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.968178] ? find_held_lock+0x36/0x1c0 [ 331.972243] ? __lock_is_held+0xb5/0x140 [ 331.976318] ? btrfs_unlink_subvol+0x4f8/0x1040 [ 331.981004] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.986458] ? find_held_lock+0x36/0x1c0 [ 331.990528] __should_failslab+0x124/0x180 [ 331.994762] should_failslab+0x9/0x14 [ 331.998563] kmem_cache_alloc+0x2be/0x730 [ 332.002731] ? find_held_lock+0x36/0x1c0 [ 332.006795] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 332.011816] __kernfs_new_node+0x127/0x8d0 [ 332.016054] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 332.020813] ? kasan_check_write+0x14/0x20 [ 332.025049] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 332.029993] ? __kernfs_new_node+0x697/0x8d0 [ 332.034418] ? wait_for_completion+0x8a0/0x8a0 [ 332.039008] ? zap_class+0x640/0x640 [ 332.042740] ? kasan_check_write+0x14/0x20 [ 332.046995] ? __lock_is_held+0xb5/0x140 [ 332.051061] ? wait_for_completion+0x8a0/0x8a0 [ 332.055661] ? mutex_unlock+0xd/0x10 [ 332.059404] ? kernfs_activate+0x21a/0x2c0 [ 332.063640] kernfs_new_node+0x95/0x120 [ 332.067632] __kernfs_create_file+0x5a/0x340 [ 332.072053] sysfs_add_file_mode_ns+0x222/0x530 [ 332.076728] internal_create_group+0x3df/0xd80 [ 332.081316] ? remove_files.isra.1+0x190/0x190 [ 332.085895] ? up_write+0x7b/0x220 [ 332.089464] ? down_write_nested+0x130/0x130 [ 332.093869] ? down_read+0x120/0x120 [ 332.097592] sysfs_create_group+0x1f/0x30 [ 332.101754] lo_ioctl+0x1307/0x1d60 [ 332.105386] ? lo_rw_aio+0x1ef0/0x1ef0 [ 332.109273] blkdev_ioctl+0xd8a/0x21b0 [ 332.113174] ? blkpg_ioctl+0xc10/0xc10 [ 332.117063] ? avc_ss_reset+0x190/0x190 [ 332.121038] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 332.125968] ? kasan_check_read+0x11/0x20 [ 332.130116] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 332.135387] ? rcu_softirq_qs+0x20/0x20 [ 332.139376] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.144828] block_ioctl+0xee/0x130 [ 332.148450] ? blkdev_fallocate+0x400/0x400 [ 332.152786] do_vfs_ioctl+0x1de/0x1790 [ 332.156690] ? ioctl_preallocate+0x300/0x300 [ 332.161132] ? selinux_file_mprotect+0x620/0x620 [ 332.165916] ? rcu_read_lock_sched_held+0x14f/0x180 [ 332.170946] ? kmem_cache_free+0x1fb/0x290 [ 332.175195] ? putname+0xf7/0x130 [ 332.178676] ? do_syscall_64+0x9a/0x820 [ 332.182698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.188238] ? security_file_ioctl+0x94/0xc0 [ 332.192656] ksys_ioctl+0xa9/0xd0 [ 332.196114] __x64_sys_ioctl+0x73/0xb0 [ 332.200005] do_syscall_64+0x1b9/0x820 [ 332.203914] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 332.209312] ? syscall_return_slowpath+0x5e0/0x5e0 [ 332.214236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.219078] ? trace_hardirqs_on_caller+0x310/0x310 [ 332.224109] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 332.229129] ? prepare_exit_to_usermode+0x291/0x3b0 [ 332.234149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.239001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.244188] RIP: 0033:0x4574d7 05:14:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x4020940d, 0x0) [ 332.247383] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.266280] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 332.273985] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 332.281261] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 332.288525] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 332.295800] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 332.303080] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000080)="49fba2462d895c64ff9ec86c02aae59b8e44c37b819d875cb34399c71ed8451e2c62376259dd7f96bf71da6085740af63194bd92bad93c0833ff9571e93d35b53f25b2f79c8df60d68004714fbc9c97a36bb3d6fa989e703e9aca00b41f49f99abc386ea829bbf5cf4208d71727de14968c285c9a9920a3714d2d5c495", 0x7d}, {&(0x7f0000000000)="ef9070f5b3ac426479654d80a1490c48c4bc", 0x12}, {&(0x7f00000002c0)="9a3eadc4795abc04c207b58420bd83c2b50fee8a9d29f3d2e7ceea656b8ce4543c473c057116d536b356486f46f26e26b241298cde0bf13062465a7ee4847dad50ed47c4418a5e967e579c4d8b94fac066df8dfb1cd9501503354cb1f5c8d6ee0b2ae40ea448fdf9cfc3b7fe4b21681b8d0e80228f35c705d1eed90ca65cdb4ab6145b433d8c533c604bbea23fe9e980880bdc9fec82ddeed188b9228e723c0ac1c6f528631c54fa75454bff55038220603e3429fba1410a833f5ce58442a55b30659bcfe5ff4765955fa5da3d947ff9a6a2a7758d9bce7253b1c98d6e8427fc6ab805361990351f90100482afe4d38f1faad4", 0xf3}, {&(0x7f0000000100)="ac43f5b8dd397fbdbc2d8083132dc297a809c738df0f2db519762506aebb9b89acfe18a71f6cde7557f4d44398c9f36c25f7c11f85aac0235ed995c485468f74be756425f0dcd70971b115d9c3440dab7e185b32f373d87e72aa82e335cb5ea6972e56a4712a662525cf89c1dbfb8a0ab8c38b25827b6a7197cd859312677f15c4e572303e58960c81bd9d1209b366cb52056d8144b434e22d578ef79baf", 0x9e}, {&(0x7f00000003c0)="84f24e710bdd3a8fde18d1cb625d316dfd18b4b4e5cb2c886d5fe6072d8a8b0a686c635cc6b298df7e94f48e6c012ae7dbbc00885787ca702eb7956439975202f24a30ede99eb9161d800256ea0e55b9a6b771dd2cc5d0dd047c017876117a15a92a86419840419eadcc28ddd3adf488ea79abf703eb775a4a248eec1374d79271d3426e9b4d9c5ea35e28ef5b5ca6cba19eb252e3f3c9f7f3b43138b95764dea2d80a87473089cdf1e4ccd9571c540afc997714804dcdbc1ef37953", 0xbc}, {&(0x7f0000000480)="4dc724a4f6b00830710de930a8af261aab5a350b2891e7eae7dbde774b78257ddda091758bed074fc5d315c299837e544c773cba9f854b043333fec79ee7be58fbb44bc7002939b28f7e44d6bbdd3a71ff3bdc8e9cfda0d8faf6bea6cde83bad4770326465aaada11b949743f4ac768885d92b2461a8e71bb36d8d14171ea1c830b9c9950d2fb36315264313d8a2", 0x8e}, {&(0x7f0000000540)="633d09d22cd388399e285da2436dec438a2f71946c9e01db9fcb7129db9366758bef7685979cc362ffeb0052d875efff0b2ad5907b4591d38bafbf5dd113bb3c28d0781dac30cc960545059e7df62a191e526740c1671ac662acb96852498c846fb3dd8d362c0418ec9bb8e45cf6c898ffb477b0943e0afa3da107a715c03a98150004b4246522a7971398eb4439", 0x8e}, {&(0x7f0000000600)="01557807073fdebc1e77403ee54b759ec016204b1166295a979a0928f83cc9b09c2c96778ebdb6490dc20bac933c7057e73f3bd8a7ac5c11627aa21984d19f55df4db90223c5a783b799a257f2f470d296b5e0d01b446ea027aaaa73c13b6df709697df7b469d8517f96c87deaf4ce9e3a0e494211e1baa41ddec2eb0b836f80b1af14b0676266526ff4bfff74dbe95b3fe3565f98276f3a85d29fb3669ecee1ee4c3d382f7c41f7f37a6c53035dcabb0cb32c1846b6c08b2013f9f42415ad8759be62bb", 0xc4}, {&(0x7f0000000700)="17089cf0add2b0d1d0902f930592451e426324307acc5f35aef5f475cd78cab1e514798c92517fb311aaac7a9c0c98541fcb8e1b1bec53ab6b576fa001c1c4c505c003f348eb0473b77754386bd1ff3292ee563097a3c4ee4da8475e50d5de570d2771f2257d02396227b1ade4444adbaac360ec9e3be10495fcdef0430819b946420b29c8342f2bd56108dfa0ed0ba186fb0312c8d5d095024821a3e820e1188363c02e29c80db3aab2a9eec8fce89dd7191e7e87d6e5a91a663a3783f4a160fe7bd9bcfc5c0bbe4b0f4dadb488625924f83cdcfbacbc4c1cc0a58e0300b3bb077e7a7e163cec78fa05", 0xea}, {&(0x7f0000000240)="54e3e9cf0c0b990e1c341694501ae2e07b5bdc039ef9b6c0dfb279eb902beb36439fe51374", 0x25}], 0xa, &(0x7f00000008c0)=[@iv={0x50, 0x117, 0x2, 0x3a, "0041259c32076de4e9b48dffc3e042ea25257b8b1190dbc99de566520181508bdde63b27bf2edf2304df28602ed7297c7ce4741bd1ce58c90b0a"}, @op={0x18, 0x117, 0x3, 0x1}], 0x68, 0x4000000}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:55 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x5451, 0x0) 05:14:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x40}) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR64, @ANYRESDEC=r0, @ANYRESDEC=r1], @ANYRESOCT=0x0, @ANYRES64=r1, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="11c3473d905aa112df2f50b2c3781df341cdfb619e99c850d17a30e610be9a94cff01d8fe2d1a175aa486f54e3b129ee4051a9e482638248a88e2d346965d4888302ebd350a39a5cf4c23500fae260e4c1434e332a9ba5dc5299aaf1540734a9543983717ae49884345976a869bc53406662af23d97162b4bb8dd2d2bd1851ba565e4b0b979013536d76ef6a4417d81c844484b0d53a47308117b96fd1a7fa0c539a44d5b3f5b2bda8e5a4dac5027cd076d95ad72996a003f75506d3df6d529f1e67a127ad9a5373528442", @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESOCT=r0, @ANYBLOB="c41a2bb471cfd1763b680e056b816346e1e5125fb6162dd3e5bc0298189d77b94293a6586321109267299ef3e501842d64c8605df50b85c306f2c8dc3a6f4ae51bf8e896f5cfa2e62771f9d0c2a778693ddc1bb6e113d063699f851fd7037589968b61f3b7a4df52b64e0454962c524b44912b044d87e45b5f69ac06398bda1d509523337bd49f5d41cc019a4278485a64b4f2cfea91e42f5510859f321f729c85e8157d27e33a697d52dba929296587089f77", @ANYBLOB="b160d68b74e05cb173f4cec952f2083ece99fc36bd704101257d7320fdcce47b8759a669d54417d991e5c416ca8e8e52023fb1b8c37ffca422b294d21fa4b846bf54206ef27f0ee8c113a232a7463d7c6bfa5d8c7d0024c28f0c821ce436bfd04fbbe93f8bd424239804cc7947f0ab0cbfa7f70eefa4c24e1c020e305f9a1e70eef9817d2b8cccbc47701ba34fde0e6081329bdae9cc77eb72a04bcaa9b575231f0581756526fb9db75f490aa4dbb31c56c877b30edb3840702ad7e0c71212248e05b8470c542bdf4c", @ANYPTR64], @ANYRES32=r1, @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESHEX=r0], @ANYRESDEC=r0], @ANYPTR64, @ANYBLOB="23a5d82620309af45e01a3e9dbe6e4331f1a3740b29f36bb777f1b84479a5a6e8f7ad1a85ee499445b695af2e1ef3c84794b2678affab3be7e382b3422b7f52f573bf156b00db1983155b8e2243659e9e782e0ababc0b9b234383db54e7eee5124", @ANYRESOCT=r0, @ANYRES64=r1, @ANYRESHEX=r0, @ANYRES16=0x0, @ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRESOCT=0x0, @ANYRES16=r2, @ANYPTR64, @ANYBLOB="d27bba27375d0dac710e1635d3e008b3513562c25ec583f60e67b704c94dd569238fdc4b69e80be6dd77161e1151d31825db922ada4f29af5ec63f3abf344ae29368a261dc9df05e58de4067a5ddbc0a", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRES32=0x0, @ANYRES32=r2], @ANYRESDEC=r2, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRESDEC=r1, @ANYRES64=r0, @ANYRES64=0x0, @ANYPTR, @ANYPTR64, @ANYPTR, @ANYPTR], @ANYRESHEX=r2, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYPTR64]]], 0x8}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:56 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000000)={0xfffffffffffffffe, [0x1f, 0x0, 0x7, 0x10000, 0xfffffffffffeffff, 0xffffffffffffff35, 0x6, 0x1, 0x6, 0x401, 0x3, 0x6, 0x66, 0xa2c, 0x400, 0x7ff, 0x4, 0xffff, 0x6, 0x5, 0x8, 0xb1b, 0x143b, 0x9026, 0x4b5, 0x6, 0x76, 0xffff, 0x1ff, 0x7, 0x7, 0x3, 0x1, 0x101, 0x18, 0x4dd3a7, 0x8000, 0x3, 0x8001, 0x5, 0x5, 0x1ec, 0x7, 0x70, 0x7, 0x5, 0x40, 0x2], 0xa}) 05:14:56 executing program 2 (fault-call:0 fault-nth:14): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x24007ffc) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:56 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 05:14:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x202003, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000040), 0x7dd, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000001c0)={'i\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) dup3(r2, r1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) [ 332.931238] FAULT_INJECTION: forcing a failure. [ 332.931238] name failslab, interval 1, probability 0, space 0, times 0 05:14:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 332.983849] CPU: 0 PID: 14738 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 332.991250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.000604] Call Trace: [ 333.003235] dump_stack+0x244/0x39d [ 333.006897] ? dump_stack_print_info.cold.1+0x20/0x20 [ 333.012123] should_fail.cold.4+0xa/0x17 [ 333.016216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.021331] ? lock_release+0xa00/0xa00 [ 333.025318] ? perf_trace_sched_process_exec+0x860/0x860 05:14:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0fc897515e135ffdda37442274c6645cdee5ac605440422b08edfce3b3487bec18070d6e9b4be4ae54b8e618854b10bb7d0a05c756e6617db70984a66e6bd7a13f4dd63c82170bf8dc84a62a2caf9526fc527e5360e86730210770316513840c2b732c185cbca556b4ffe25ef567"], 0x1}}, 0x24008000) r2 = getegid() getsockname$unix(r1, &(0x7f00000003c0), &(0x7f0000000440)=0x6e) getgroups(0x1, &(0x7f0000000000)=[r2]) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0xd0, r3, 0x500, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4000000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffb}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffde43ae37}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x993}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1884}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7aa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfa0d}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 333.030810] ? zap_class+0x640/0x640 [ 333.034539] ? find_held_lock+0x36/0x1c0 [ 333.038613] ? __lock_is_held+0xb5/0x140 [ 333.042690] ? hdmi_infoframe_unpack+0xe28/0x15f0 [ 333.047555] ? perf_trace_sched_process_exec+0x860/0x860 [ 333.053024] ? kernfs_activate+0x21a/0x2c0 [ 333.053053] __should_failslab+0x124/0x180 [ 333.053074] should_failslab+0x9/0x14 [ 333.061529] kmem_cache_alloc+0x2be/0x730 [ 333.061547] ? lock_downgrade+0x900/0x900 [ 333.061566] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 333.061586] __kernfs_new_node+0x127/0x8d0 [ 333.061613] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 333.078725] ? zap_class+0x640/0x640 [ 333.078751] ? __lock_is_held+0xb5/0x140 [ 333.078766] ? wait_for_completion+0x8a0/0x8a0 [ 333.078792] ? mutex_unlock+0xd/0x10 [ 333.091451] ? kernfs_activate+0x21a/0x2c0 [ 333.108004] ? kernfs_walk_and_get_ns+0x340/0x340 [ 333.112872] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 333.118424] ? kernfs_link_sibling+0x1d2/0x3b0 [ 333.123018] kernfs_new_node+0x95/0x120 [ 333.127019] __kernfs_create_file+0x5a/0x340 [ 333.131443] sysfs_add_file_mode_ns+0x222/0x530 [ 333.136134] internal_create_group+0x3df/0xd80 [ 333.140732] ? remove_files.isra.1+0x190/0x190 [ 333.145319] ? up_write+0x7b/0x220 [ 333.148868] ? down_write_nested+0x130/0x130 [ 333.153307] ? down_read+0x120/0x120 [ 333.157053] sysfs_create_group+0x1f/0x30 [ 333.161228] lo_ioctl+0x1307/0x1d60 [ 333.164887] ? lo_rw_aio+0x1ef0/0x1ef0 [ 333.168799] blkdev_ioctl+0xd8a/0x21b0 [ 333.172721] ? blkpg_ioctl+0xc10/0xc10 [ 333.176618] ? avc_ss_reset+0x190/0x190 [ 333.176639] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 333.176667] ? kasan_check_read+0x11/0x20 [ 333.176682] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 333.176700] ? rcu_softirq_qs+0x20/0x20 [ 333.185621] ? perf_trace_sched_process_exec+0x860/0x860 [ 333.185657] block_ioctl+0xee/0x130 [ 333.185675] ? blkdev_fallocate+0x400/0x400 [ 333.212441] do_vfs_ioctl+0x1de/0x1790 [ 333.216346] ? ioctl_preallocate+0x300/0x300 [ 333.220773] ? selinux_file_mprotect+0x620/0x620 [ 333.225550] ? rcu_read_lock_sched_held+0x14f/0x180 [ 333.230576] ? kmem_cache_free+0x1fb/0x290 [ 333.234828] ? putname+0xf7/0x130 [ 333.238294] ? do_syscall_64+0x9a/0x820 [ 333.242284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.247836] ? security_file_ioctl+0x94/0xc0 [ 333.252258] ksys_ioctl+0xa9/0xd0 [ 333.255729] __x64_sys_ioctl+0x73/0xb0 [ 333.259631] do_syscall_64+0x1b9/0x820 [ 333.263534] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 333.268920] ? syscall_return_slowpath+0x5e0/0x5e0 [ 333.273918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.278796] ? trace_hardirqs_on_caller+0x310/0x310 [ 333.283827] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 333.288859] ? prepare_exit_to_usermode+0x291/0x3b0 [ 333.293888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.298752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.303946] RIP: 0033:0x4574d7 [ 333.307146] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.326048] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:14:56 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x8, 0x9, 0x5}) clock_gettime(0x2, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x101}, &(0x7f0000000200)=0x8) poll(&(0x7f0000000800)=[{r0, 0x88}, {r0, 0x18}, {r0, 0x16a58b920f3fc6d6}, {r0, 0x2}, {r0, 0x1400}, {r0, 0x2202}], 0x6, 0x2) accept4$bt_l2cap(r0, &(0x7f0000000000), &(0x7f0000000080)=0xe, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000280)={{0x0, 0x2, 0x1, 0x2, 'syz1\x00', 0x39}, 0x1, [0xffffffffffff47ca, 0x0, 0x100000000, 0x1, 0x7, 0xdab, 0x40, 0x7, 0x80000001, 0x7, 0x1000, 0x4, 0x0, 0x4, 0x9, 0xfffffffffffffe01, 0x84, 0x5, 0x0, 0x8, 0x6, 0x8, 0x8, 0x8, 0x5, 0x944, 0x332, 0x7812, 0x3ff, 0x20, 0x5, 0x1000, 0x100000001, 0x7, 0x5, 0xff, 0x4, 0x10000, 0x5, 0x4, 0x7, 0x80000001, 0xe89c0000, 0xfffffffffffffeff, 0x8001, 0x2, 0x2, 0x80000000000, 0x1, 0xfffffffffffffff8, 0x80, 0x2, 0x473, 0x1, 0x9, 0x8, 0x1, 0x0, 0x7, 0x4, 0x100, 0xaf33, 0x2, 0x0, 0x100, 0x87c0, 0xffff, 0x401, 0x0, 0x92, 0x6, 0x2, 0x7fff, 0x2, 0x8001, 0x4, 0x9, 0x10000, 0x1, 0x0, 0x7, 0x101, 0x9, 0x100000000, 0xd25, 0xc725, 0x9, 0xfffffffffffffff8, 0xfff, 0x1000, 0xf33, 0x401, 0x4, 0x89bc, 0x10001, 0x33e, 0xb6d9, 0x1, 0x0, 0x0, 0x5, 0x80000001, 0x3, 0x101, 0x20, 0x10001, 0x5, 0x4, 0xffffffff, 0x5, 0x4, 0x2, 0x4, 0x7, 0x5, 0xfffffffffffffffe, 0x7a, 0x4, 0x1f, 0x1, 0x9, 0x1, 0x800, 0x0, 0x5d, 0x8, 0xfffffffffffffffb, 0xff], {r1, r2+30000000}}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000a40)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000780)=0x80000001, 0x4) r4 = gettid() sched_rr_get_interval(r4, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000007c0)=0x4, 0x4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000a00)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r5, @ANYBLOB="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"], 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x20040040) 05:14:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xc8, 0xc8000) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) [ 333.333758] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 333.341059] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 333.348330] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 333.355603] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 333.362873] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @empty}, &(0x7f0000000080)=0xc) 05:14:56 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000280)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e22}, {0x306, @remote}, 0x40, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 'lo\x00'}) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x101, 0x1, 0xfb3, 0x1}, 0x10) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000000)=0x10001) 05:14:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:57 executing program 2 (fault-call:0 fault-nth:15): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bind$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710, @reserved}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x7fffffff, 0x3ff}) dup3(r2, r1, 0x0) sysfs$1(0x1, &(0x7f0000000000)='/dev/kvm\x00') [ 333.884708] FAULT_INJECTION: forcing a failure. [ 333.884708] name failslab, interval 1, probability 0, space 0, times 0 [ 333.940817] CPU: 1 PID: 14806 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 333.948198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.957552] Call Trace: [ 333.960160] dump_stack+0x244/0x39d [ 333.963812] ? dump_stack_print_info.cold.1+0x20/0x20 [ 333.969034] should_fail.cold.4+0xa/0x17 [ 333.973117] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.978234] ? lock_release+0xa00/0xa00 [ 333.982217] ? perf_trace_sched_process_exec+0x860/0x860 [ 333.987690] ? zap_class+0x640/0x640 [ 333.991453] ? find_held_lock+0x36/0x1c0 [ 333.995541] ? __lock_is_held+0xb5/0x140 [ 333.999620] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.005101] ? kernfs_activate+0x21a/0x2c0 [ 334.009354] __should_failslab+0x124/0x180 [ 334.013602] should_failslab+0x9/0x14 [ 334.017422] kmem_cache_alloc+0x2be/0x730 [ 334.021584] ? lock_downgrade+0x900/0x900 [ 334.025743] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 334.030776] __kernfs_new_node+0x127/0x8d0 [ 334.035063] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 334.039863] ? zap_class+0x640/0x640 [ 334.043604] ? __lock_is_held+0xb5/0x140 [ 334.047693] ? wait_for_completion+0x8a0/0x8a0 [ 334.052298] ? mutex_unlock+0xd/0x10 [ 334.056050] ? kernfs_activate+0x21a/0x2c0 [ 334.060297] ? kernfs_walk_and_get_ns+0x340/0x340 [ 334.065153] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 334.070701] ? kernfs_link_sibling+0x1d2/0x3b0 [ 334.075312] kernfs_new_node+0x95/0x120 [ 334.079308] __kernfs_create_file+0x5a/0x340 [ 334.083731] sysfs_add_file_mode_ns+0x222/0x530 [ 334.088420] internal_create_group+0x3df/0xd80 [ 334.093015] ? remove_files.isra.1+0x190/0x190 [ 334.097601] ? up_write+0x7b/0x220 [ 334.101166] ? down_write_nested+0x130/0x130 [ 334.105575] ? down_read+0x120/0x120 [ 334.109306] sysfs_create_group+0x1f/0x30 [ 334.113470] lo_ioctl+0x1307/0x1d60 [ 334.117105] ? lo_rw_aio+0x1ef0/0x1ef0 [ 334.121001] blkdev_ioctl+0xd8a/0x21b0 [ 334.124899] ? blkpg_ioctl+0xc10/0xc10 [ 334.128823] ? avc_ss_reset+0x190/0x190 [ 334.132804] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 334.137743] ? kasan_check_read+0x11/0x20 [ 334.141904] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 334.147180] ? rcu_softirq_qs+0x20/0x20 [ 334.151199] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.156671] block_ioctl+0xee/0x130 [ 334.160301] ? blkdev_fallocate+0x400/0x400 [ 334.164639] do_vfs_ioctl+0x1de/0x1790 [ 334.168556] ? ioctl_preallocate+0x300/0x300 [ 334.172970] ? selinux_file_mprotect+0x620/0x620 [ 334.177733] ? rcu_read_lock_sched_held+0x14f/0x180 [ 334.182753] ? kmem_cache_free+0x1fb/0x290 [ 334.186996] ? putname+0xf7/0x130 [ 334.190465] ? do_syscall_64+0x9a/0x820 [ 334.194449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.199987] ? security_file_ioctl+0x94/0xc0 [ 334.204394] ksys_ioctl+0xa9/0xd0 [ 334.207859] __x64_sys_ioctl+0x73/0xb0 [ 334.211753] do_syscall_64+0x1b9/0x820 [ 334.215637] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 334.221015] ? syscall_return_slowpath+0x5e0/0x5e0 [ 334.225972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.230820] ? trace_hardirqs_on_caller+0x310/0x310 [ 334.235836] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 334.240858] ? prepare_exit_to_usermode+0x291/0x3b0 [ 334.245900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.250789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.255991] RIP: 0033:0x4574d7 [ 334.259192] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.278089] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:14:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:57 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 05:14:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000180)={'bridge_slave_0\x00', @random="bae787d7991e"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x400000) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000000c0)) r5 = dup2(r0, r0) ioctl$VIDIOC_QUERY_EXT_CTRL(r5, 0xc0e85667, &(0x7f0000000280)={0x80000000, 0x0, "183e35febd379a468207f448771efeff442710d9126ee8d048456c734b859967", 0xb, 0x6, 0x0, 0xfffffffffffffffd, 0x80000000, 0x81, 0x8, 0x89, [0x1ff, 0xff, 0x1000, 0x6]}) dup3(r3, r1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) [ 334.285797] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 334.293067] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 334.300359] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 334.307624] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 334.314892] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:57 executing program 4: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'system.', '&\x00'}, &(0x7f00000000c0)=""/84, 0x54) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x30) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xc8, 0xc8000) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:14:57 executing program 2 (fault-call:0 fault-nth:16): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/audio\x00', 0x8000000000042, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) connect$packet(r1, &(0x7f00000003c0)={0x11, 0xd, r2, 0x1, 0x1f, 0x6, @broadcast}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="782c57bb93531004644f86f20b4e838426db528a327ad8012149"], 0x1}}, 0x24008000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @empty}}, [0x66, 0xc079, 0x0, 0xc70, 0x8, 0x5, 0x0, 0x86, 0x101, 0x7f, 0x309, 0x7, 0x9, 0x0, 0x80000000]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x101}}, 0x3, 0x100000000, 0x8, 0xa4, 0x4}, &(0x7f0000000240)=0x98) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="03c46b8ca8a630436342f780cabcf47d7c34cb23abdd658f5d72696ef31ff89efe8d2bbb73eeca9b18af3a08949d9612750778e3deb10a67335e549d499dcad4f2151f3e2e267ee7e54b875b3c5c60ba0ac5d4ea42015ad222d98ffec8dc218d4abdc734713ad1cfbffa1608bbdf750087298a082e463faa2d"], 0x1}}, 0x0) 05:14:57 executing program 3: pipe(&(0x7f0000000000)) r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 334.521177] FAULT_INJECTION: forcing a failure. [ 334.521177] name failslab, interval 1, probability 0, space 0, times 0 [ 334.589686] CPU: 1 PID: 14833 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 334.597078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.606439] Call Trace: [ 334.606468] dump_stack+0x244/0x39d [ 334.606493] ? dump_stack_print_info.cold.1+0x20/0x20 [ 334.606527] should_fail.cold.4+0xa/0x17 [ 334.621968] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.627118] ? lock_release+0xa00/0xa00 [ 334.631124] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.636585] ? zap_class+0x640/0x640 [ 334.636612] ? find_held_lock+0x36/0x1c0 [ 334.636689] ? __lock_is_held+0xb5/0x140 [ 334.636732] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.653975] ? kernfs_activate+0x21a/0x2c0 [ 334.658239] __should_failslab+0x124/0x180 [ 334.662491] should_failslab+0x9/0x14 [ 334.666305] kmem_cache_alloc+0x2be/0x730 [ 334.670461] ? lock_downgrade+0x900/0x900 [ 334.674615] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 334.679642] __kernfs_new_node+0x127/0x8d0 [ 334.683893] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 334.688663] ? zap_class+0x640/0x640 [ 334.692424] ? __lock_is_held+0xb5/0x140 [ 334.696488] ? wait_for_completion+0x8a0/0x8a0 [ 334.701144] ? mutex_unlock+0xd/0x10 [ 334.704861] ? kernfs_activate+0x21a/0x2c0 [ 334.709102] ? kernfs_walk_and_get_ns+0x340/0x340 [ 334.713961] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 334.719501] ? kernfs_link_sibling+0x1d2/0x3b0 [ 334.724092] kernfs_new_node+0x95/0x120 [ 334.728072] __kernfs_create_file+0x5a/0x340 [ 334.732502] sysfs_add_file_mode_ns+0x222/0x530 [ 334.737178] internal_create_group+0x3df/0xd80 [ 334.741775] ? remove_files.isra.1+0x190/0x190 [ 334.746356] ? up_write+0x7b/0x220 [ 334.749913] ? down_write_nested+0x130/0x130 [ 334.754324] ? down_read+0x120/0x120 [ 334.758196] sysfs_create_group+0x1f/0x30 [ 334.762348] lo_ioctl+0x1307/0x1d60 [ 334.765979] ? lo_rw_aio+0x1ef0/0x1ef0 [ 334.769871] blkdev_ioctl+0xd8a/0x21b0 [ 334.773765] ? blkpg_ioctl+0xc10/0xc10 [ 334.777665] ? avc_ss_reset+0x190/0x190 [ 334.781652] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 334.786586] ? kasan_check_read+0x11/0x20 [ 334.790752] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 334.796044] ? rcu_softirq_qs+0x20/0x20 [ 334.800047] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.805534] block_ioctl+0xee/0x130 [ 334.809178] ? blkdev_fallocate+0x400/0x400 [ 334.813500] do_vfs_ioctl+0x1de/0x1790 [ 334.817409] ? ioctl_preallocate+0x300/0x300 [ 334.821827] ? selinux_file_mprotect+0x620/0x620 [ 334.826603] ? rcu_read_lock_sched_held+0x14f/0x180 [ 334.831620] ? kmem_cache_free+0x1fb/0x290 [ 334.835885] ? putname+0xf7/0x130 [ 334.839341] ? do_syscall_64+0x9a/0x820 [ 334.843320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.848856] ? security_file_ioctl+0x94/0xc0 [ 334.853281] ksys_ioctl+0xa9/0xd0 [ 334.856743] __x64_sys_ioctl+0x73/0xb0 [ 334.860658] do_syscall_64+0x1b9/0x820 [ 334.864556] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 334.869924] ? syscall_return_slowpath+0x5e0/0x5e0 [ 334.874855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.879703] ? trace_hardirqs_on_caller+0x310/0x310 [ 334.884722] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 334.890210] ? prepare_exit_to_usermode+0x291/0x3b0 [ 334.895238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.900093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.905287] RIP: 0033:0x4574d7 [ 334.908485] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.927385] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 334.935112] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 334.942384] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 334.949679] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 334.956946] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 334.964214] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 05:14:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x2) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:14:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) timer_create(0x7, &(0x7f0000000240)={0x0, 0x36, 0x1, @thr={&(0x7f0000000100)="18451276a5caa25a73a722ad5210c53635d85b4aea64e4dfb764acd1a13b54408d6a353c03a632a6df8f98a7bf815d6a26c1329decdce17b4aeb1ae454237c5e2604bdf792036138a9a26baa85c46f5605247f6c5cdecb374ce84c6843b229c4726ca18251a6d3d0ab8bdaad205d3bd811d3e3b1e15d3e0dc9dd041fafa820a086c16e0b36c629f7bd4540bf29d7121b51cdf89e88740e5c9bdceccec88c2cd18162df7ea6658f9ec9de5715cde9770f06645fd610", &(0x7f00000002c0)="07faf4363c8838fc979b4c91cdd1a9af616f755ee7fade247e7ff2ebea3b1debaf33c072d8e378d9afed502dd32fa1c342a8666ccbe490fc1ab4fc7fec61efb2fd3de0949628cb44b6534dd781af477b3ed4595548ad25cb8d19665b6ddb6d7631c0b033f90b9971c6b7ae012bd1f2c28a896278c6959705453e97cbe852bc745f1ba127aa84ecea12ccf275012fd3624506df976088eea00a046a4c54046dcf2bc99a09a913f02ac9f3ef1aa50b18d4cbea"}}, &(0x7f0000000380)=0x0) timer_settime(r1, 0x1, &(0x7f00000003c0)={{0x0, 0x1c9c380}}, &(0x7f0000000400)) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000080)={@loopback, @multicast1}, 0x8) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000000)={0xfffffffffffff442, 0x6, 0x8, 0xc3, 0x7f, 0x4}) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000001600)={0x0, 0x3cf, &(0x7f00000015c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x1}}, 0x24008000) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:58 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x24) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) 05:14:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2f, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 05:14:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 05:14:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="f10c8356229db8999f7d449e88866245049f5107e11dfc30b6b934ce8bb94633bd06abe3d52aaba8f34761affb81222ae16f1bad2a33d3eb06000000000000003424bd96d4f4b9609ce8ba93b975c7b6a3b9c137e5e7dcc65a0e5f220430028bb13e07e51d7a1017f75ee0774e76034c15eb7942226ae17fe0f834b6261ebc5e1d09cb8cb05fe3f978a9d31b0d125b54257c03d26956701a3cd2ef7b845b00786c"], 0x1}}, 0x24008000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setfsgid(r2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000001980)=ANY=[@ANYBLOB], 0x1}}, 0x0) 05:14:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e24, @multicast2}, {0x6, @remote}, 0x20, {0x2, 0x4e24, @multicast2}, 'veth1\x00'}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x2c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x5, @remote, 0x5}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x6, 0x8}, &(0x7f0000000100)=0x8) 05:14:58 executing program 2 (fault-call:0 fault-nth:17): syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 05:14:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'Xebug_want_extra_isize'}}]}) 05:14:58 executing program 3: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$netlink(0x10, 0x3, 0x2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80400000}, 0xc) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @window={0x3, 0x9, 0x4}], 0x5) r3 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0x9201, 0x0) 05:14:58 executing program 4 (fault-call:1 fault-nth:0): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 335.538822] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) [ 335.562586] FAULT_INJECTION: forcing a failure. [ 335.562586] name failslab, interval 1, probability 0, space 0, times 0 [ 335.575115] CPU: 1 PID: 14896 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #161 [ 335.582499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.591865] Call Trace: [ 335.594477] dump_stack+0x244/0x39d [ 335.598137] ? dump_stack_print_info.cold.1+0x20/0x20 [ 335.603366] should_fail.cold.4+0xa/0x17 [ 335.607456] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.612581] ? lock_release+0xa00/0xa00 [ 335.616570] ? perf_trace_sched_process_exec+0x860/0x860 [ 335.622044] ? zap_class+0x640/0x640 [ 335.623533] FAULT_INJECTION: forcing a failure. [ 335.623533] name failslab, interval 1, probability 0, space 0, times 0 [ 335.625782] ? find_held_lock+0x36/0x1c0 [ 335.625805] ? __lock_is_held+0xb5/0x140 [ 335.625823] ? seg6_hmac_info_add+0x5a8/0x13e0 [ 335.625851] ? perf_trace_sched_process_exec+0x860/0x860 [ 335.625866] ? kernfs_activate+0x21a/0x2c0 [ 335.625923] __should_failslab+0x124/0x180 [ 335.625963] should_failslab+0x9/0x14 [ 335.645436] kmem_cache_alloc+0x2be/0x730 [ 335.645469] ? lock_downgrade+0x900/0x900 [ 335.645488] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 335.645525] __kernfs_new_node+0x127/0x8d0 [ 335.655542] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 335.655560] ? zap_class+0x640/0x640 [ 335.655586] ? __lock_is_held+0xb5/0x140 [ 335.655605] ? wait_for_completion+0x8a0/0x8a0 [ 335.702424] ? mutex_unlock+0xd/0x10 [ 335.706218] ? kernfs_activate+0x21a/0x2c0 [ 335.710480] ? kernfs_walk_and_get_ns+0x340/0x340 [ 335.715339] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 335.720887] ? kernfs_link_sibling+0x1d2/0x3b0 [ 335.725486] kernfs_new_node+0x95/0x120 [ 335.729481] __kernfs_create_file+0x5a/0x340 [ 335.733910] sysfs_add_file_mode_ns+0x222/0x530 [ 335.738599] internal_create_group+0x3df/0xd80 [ 335.743203] ? remove_files.isra.1+0x190/0x190 [ 335.747802] ? up_write+0x7b/0x220 [ 335.751349] ? down_write_nested+0x130/0x130 [ 335.755762] ? down_read+0x120/0x120 [ 335.759493] sysfs_create_group+0x1f/0x30 [ 335.763662] lo_ioctl+0x1307/0x1d60 [ 335.767339] ? lo_rw_aio+0x1ef0/0x1ef0 [ 335.771234] blkdev_ioctl+0xd8a/0x21b0 [ 335.775128] ? blkpg_ioctl+0xc10/0xc10 [ 335.779022] ? avc_ss_reset+0x190/0x190 [ 335.783010] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 335.787953] ? kasan_check_read+0x11/0x20 [ 335.792108] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 335.797387] ? rcu_softirq_qs+0x20/0x20 [ 335.801401] ? perf_trace_sched_process_exec+0x860/0x860 [ 335.806879] block_ioctl+0xee/0x130 [ 335.810514] ? blkdev_fallocate+0x400/0x400 [ 335.814847] do_vfs_ioctl+0x1de/0x1790 [ 335.818747] ? ioctl_preallocate+0x300/0x300 [ 335.823169] ? selinux_file_mprotect+0x620/0x620 [ 335.827942] ? rcu_read_lock_sched_held+0x14f/0x180 [ 335.832970] ? kmem_cache_free+0x1fb/0x290 [ 335.837211] ? putname+0xf7/0x130 [ 335.840717] ? do_syscall_64+0x9a/0x820 [ 335.844703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.850244] ? security_file_ioctl+0x94/0xc0 [ 335.854674] ksys_ioctl+0xa9/0xd0 [ 335.858147] __x64_sys_ioctl+0x73/0xb0 [ 335.862037] do_syscall_64+0x1b9/0x820 [ 335.865963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 335.871336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 335.876302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.881166] ? trace_hardirqs_on_caller+0x310/0x310 [ 335.886198] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 335.891700] ? prepare_exit_to_usermode+0x291/0x3b0 [ 335.896755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.901611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.906816] RIP: 0033:0x4574d7 [ 335.910033] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.928946] RSP: 002b:00007fce7cd3ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:14:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000040)={0xfffffffffffffff9, 0x4}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x81, 0x7, 0x3, 0x1, 0x5c}) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000140)={{0x7, @addr=0xffffffffff599dbd}, "a93991bbede59bf8d1414660f4a640da3fc41a656e8337631eeca88a26b8baa6", 0x2}) ioctl$KIOCSOUND(r3, 0x4b2f, 0x7) r4 = dup3(r2, r1, 0x0) ioctl$KVM_NMI(r4, 0xae9a) 05:14:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x6, 0x80000000, @value=0xff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x0, 0x1000, 0x80, {0x77359400}, 0x2, 0x5}) [ 335.936666] RAX: ffffffffffffffda RBX: 00007fce7cd3f6d4 RCX: 00000000004574d7 [ 335.943941] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 335.943950] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 335.943959] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 335.943968] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000003 [ 335.981432] CPU: 0 PID: 14905 Comm: syz-executor4 Not tainted 4.20.0-rc7+ #161 [ 335.988809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.998166] Call Trace: [ 336.000771] dump_stack+0x244/0x39d [ 336.004417] ? dump_stack_print_info.cold.1+0x20/0x20 [ 336.009634] should_fail.cold.4+0xa/0x17 [ 336.013728] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.018851] ? __find_get_block+0x3be/0xf20 [ 336.023193] ? __lock_is_held+0xb5/0x140 [ 336.027265] ? zap_class+0x640/0x640 [ 336.030996] ? perf_trace_sched_process_exec+0x860/0x860 [ 336.036452] ? __lock_is_held+0xb5/0x140 [ 336.040528] ? zap_class+0x640/0x640 [ 336.044242] ? perf_trace_sched_process_exec+0x860/0x860 [ 336.049692] ? up_write+0x7b/0x220 [ 336.053247] __should_failslab+0x124/0x180 [ 336.057490] should_failslab+0x9/0x14 [ 336.061296] kmem_cache_alloc+0x2be/0x730 [ 336.065447] ? lock_acquire+0x1ed/0x520 [ 336.069427] ? ext4_xattr_get+0x161/0xb30 [ 336.073583] mb_cache_entry_create+0x143/0xb30 [ 336.078163] ? lock_release+0xa00/0xa00 [ 336.082138] ? perf_trace_sched_process_exec+0x860/0x860 [ 336.087592] ? mark_held_locks+0x130/0x130 [ 336.091835] ? mb_cache_scan+0x50/0x50 [ 336.095730] ? ext4_xattr_inode_set_class+0x60/0x60 [ 336.100752] ? down_read+0x8d/0x120 [ 336.104380] ? ext4_xattr_get+0x161/0xb30 [ 336.108530] ? __down_interruptible+0x700/0x700 [ 336.113207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.118754] ext4_xattr_get+0x5ef/0xb30 [ 336.122739] ? ext4_xattr_ibody_get+0x620/0x620 [ 336.127428] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 336.132484] ? xattr_resolve_name+0x330/0x430 [ 336.136986] ext4_xattr_security_get+0x32/0x40 [ 336.141598] ? ext4_xattr_security_set+0x40/0x40 [ 336.146374] __vfs_getxattr+0xee/0x150 [ 336.150265] ? __vfs_setxattr+0x180/0x180 [ 336.154416] ? zap_class+0x640/0x640 [ 336.158145] cap_inode_need_killpriv+0x40/0x60 [ 336.162733] security_inode_need_killpriv+0x4c/0xa0 [ 336.167751] dentry_needs_remove_privs.part.24+0x22/0x70 [ 336.173232] file_remove_privs+0x25d/0x540 [ 336.177470] ? perf_trace_sched_process_exec+0x860/0x860 [ 336.182930] ? dentry_needs_remove_privs.part.24+0x70/0x70 [ 336.188562] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 336.193580] ? generic_write_checks+0x266/0x3d0 [ 336.198251] ? generic_write_check_limits+0x370/0x370 [ 336.203457] ? ext4_file_write_iter+0x2a1/0x1420 [ 336.208222] __generic_file_write_iter+0x169/0x630 [ 336.213159] ext4_file_write_iter+0x390/0x1420 [ 336.217750] ? ext4_file_mmap+0x410/0x410 [ 336.221914] ? ksys_dup3+0x680/0x680 [ 336.225661] ? zap_class+0x640/0x640 [ 336.229378] ? __lock_is_held+0xb5/0x140 [ 336.233479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.239016] ? iov_iter_init+0xe5/0x210 [ 336.242994] __vfs_write+0x6b8/0x9f0 [ 336.246716] ? kernel_read+0x120/0x120 [ 336.250615] ? __lock_is_held+0xb5/0x140 [ 336.254709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.260251] ? __sb_start_write+0x1b2/0x370 [ 336.264578] vfs_write+0x1fc/0x560 [ 336.268143] ksys_write+0x101/0x260 [ 336.271775] ? __ia32_sys_read+0xb0/0xb0 [ 336.275843] ? trace_hardirqs_off_caller+0x310/0x310 [ 336.280978] __x64_sys_write+0x73/0xb0 [ 336.284884] do_syscall_64+0x1b9/0x820 [ 336.288778] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 336.294141] ? syscall_return_slowpath+0x5e0/0x5e0 [ 336.299070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.303927] ? trace_hardirqs_on_caller+0x310/0x310 [ 336.308946] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 336.313968] ? prepare_exit_to_usermode+0x291/0x3b0 [ 336.318990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.323842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.329031] RIP: 0033:0x457669 [ 336.332226] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.351120] RSP: 002b:00007fe34443ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 336.358843] RAX: ffffffffffffffda RBX: 00007fe34443ac90 RCX: 0000000000457669 [ 336.366110] RDX: 00000000ffdbc2ca RSI: 0000000020000080 RDI: 0000000000000003 [ 336.373372] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 336.380638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe34443b6d4 05:14:59 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 336.387930] R13: 00000000004c60bb R14: 00000000004dac80 R15: 0000000000000004 [ 336.432526] EXT4-fs (sda1): Unrecognized mount option "Xebug_want_extra_isize=0x0000000000000000" or missing value 05:14:59 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:14:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}]}) 05:14:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000005, 0x810, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) 05:14:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000000c0)=0xffff, 0x4) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x8, 0x4000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup2(r0, r3) dup3(r3, r1, 0x0) getuid() fcntl$getownex(r4, 0x10, &(0x7f0000000000)) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) [ 336.667062] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value [ 336.677723] audit: type=1400 audit(1545369299.970:59): avc: denied { map } for pid=14941 comm="syz-executor3" path="/dev/usbmon0" dev="devtmpfs" ino=16162 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 05:15:00 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x5, 0x5, 0x6, 0x1, 0x2, 0x0, 0x7fffffff, 0xbb63, 0x9}}, 0x43) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xb08, 0x20000) 05:15:00 executing program 2: syz_read_part_table(0x1000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 336.832234] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value 05:15:00 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x60aa}}, 0x0, 0x101}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0xfff, 0x3, 0x101, 0x7, 0x3}, &(0x7f0000000140)=0x14) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:00 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}]}) 05:15:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) r3 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000040)=""/27) dup3(r2, r1, 0x0) 05:15:00 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80002, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x100) sendmsg$nl_crypto(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="0801000012000c002dbd7000fcdbdf256372633332632d696e74656c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000024000000240000000000000000000008000100ef05000008000100010000000800010000000000080001000100000008000100ee5f00007c238e886c435e0e6449a21303a73a1b511f1f9003e6379c744edff589b6bc6ef6568b2c8b76728e88cc29dc99d32b50aa780ff3a1b4f3d48a45febb8f6fc407b9ca622ae7904d5f2215066522b16b9c8656e3c54812087e3d02bb8c83de8cde64b3ff70c8676efe07e1addbfb4817261102a609308b5c32"], 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') flock(r1, 0x3) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000400)=0x8, 0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r2, 0x100, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8}}, [""]}, 0x24}}, 0x20044890) r3 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0x9201, 0x0) [ 337.164875] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000000" or missing value [ 337.268148] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000000" or missing value 05:15:00 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 05:15:00 executing program 2: syz_read_part_table(0x6260000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x18}, 0x34, r3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000140)=0xffffffff) dup2(r0, r4) dup3(r4, r1, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)={{0x107, 0x100000001, 0x1f, 0x1b0, 0x1a2, 0x100000000, 0x84, 0x3}, "ae713a98ae42ddb36b537fed4d5048e4f2d279ea8b142cfdbb9d3aa504b07eed8a23adb03113f722421d4cd9a8b2cf1eb0c5abe0077e340414423f780993bc3590c70181ff45ebae7b8375a9cf5d67b38426eafb1ada3a58f39121bc35d515acee8c208adb593464e5f08eca6f491d53adddab8877", [[], [], [], [], [], [], [], []]}, 0x895) 05:15:00 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x7ff, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x2000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000340)={r2, 0x1, 0x3, @remote}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) 05:15:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}]}) 05:15:00 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) pipe(&(0x7f0000000000)) [ 337.604389] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 05:15:00 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x802}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r4, 0x81, 0x7, 0x100, 0x1, 0x4}, 0x14) dup2(r0, r2) dup3(r2, r1, 0x0) [ 337.753561] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 05:15:01 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x11fdbc34a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:01 executing program 2: syz_read_part_table(0x2606, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2024001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}]}) [ 337.961840] loop2: unable to read partition table [ 337.981394] loop2: partition table beyond EOD, truncated [ 337.999576] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 338.118227] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value [ 338.129784] loop2: unable to read partition table [ 338.134932] loop2: partition table beyond EOD, truncated [ 338.151024] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 338.241060] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value 05:15:01 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x7000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) r4 = dup2(r0, r2) dup3(r3, r4, 0x1000001) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x210040}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x802, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0xc080) 05:15:01 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r0, 0x7, 0x3}, 0x10) 05:15:01 executing program 2: syz_read_part_table(0x3, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}]}) [ 338.622704] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000000000" or missing value 05:15:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ff8000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000140)=0x80000000808, 0xfffffffffffffc3b) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) 05:15:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x1fd, 0x0, 0x2, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:15:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000000)=""/78) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 339.115374] FAULT_INJECTION: forcing a failure. [ 339.115374] name failslab, interval 1, probability 0, space 0, times 0 [ 339.136784] CPU: 0 PID: 15115 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 339.144176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.153527] Call Trace: [ 339.156128] dump_stack+0x244/0x39d [ 339.159781] ? dump_stack_print_info.cold.1+0x20/0x20 [ 339.165001] ? lock_downgrade+0x900/0x900 [ 339.169166] should_fail.cold.4+0xa/0x17 [ 339.173250] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.178380] ? lock_downgrade+0x900/0x900 [ 339.182547] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 339.188100] ? proc_fail_nth_write+0x9e/0x210 [ 339.192582] ? proc_cwd_link+0x1d0/0x1d0 [ 339.196633] ? find_held_lock+0x36/0x1c0 [ 339.200699] ? _edac_mc_free+0x18/0x480 [ 339.204675] ? perf_trace_sched_process_exec+0x860/0x860 [ 339.210114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.215639] __should_failslab+0x124/0x180 [ 339.219871] should_failslab+0x9/0x14 [ 339.223666] __kmalloc+0x2e0/0x760 [ 339.227192] ? strncpy_from_user+0x5a0/0x5a0 [ 339.231588] ? fput+0x130/0x1a0 [ 339.234872] ? do_syscall_64+0x9a/0x820 [ 339.238833] ? __x64_sys_memfd_create+0x142/0x4f0 [ 339.243695] ? do_syscall_64+0x9a/0x820 [ 339.247678] __x64_sys_memfd_create+0x142/0x4f0 [ 339.252332] ? memfd_fcntl+0x1910/0x1910 [ 339.256384] do_syscall_64+0x1b9/0x820 [ 339.260270] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 339.265620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 339.270533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.275402] ? trace_hardirqs_on_caller+0x310/0x310 [ 339.280411] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 339.285416] ? prepare_exit_to_usermode+0x291/0x3b0 [ 339.290442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.295271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.300442] RIP: 0033:0x457669 05:15:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}]}) 05:15:02 executing program 2: syz_read_part_table(0xe4ffffff00000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:02 executing program 3: syz_execute_func(&(0x7f0000000000)="c4236978bbece649d2058fa9e091480bc42219dfe60fb0bd6a290000f344a7f36ef040839f01000000edf2470f0d81feefffff8fe800b6828bb6ffff000ffcb75e000000") r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) fchmod(r0, 0x8) 05:15:02 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000080)={0x35, 0x3, 0x4c2, @broadcast, 'bridge0\x00'}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) [ 339.303618] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.322500] RSP: 002b:00007fca4ca53a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 339.330186] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 339.337439] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 339.344690] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 339.351960] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe [ 339.359225] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:02 executing program 1 (fault-call:7 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:02 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000280)) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000600)={'NETMAP\x00'}, &(0x7f0000000640)=0x1e) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000540)=""/122, &(0x7f00000005c0)=0x7a) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x10200, 0x0, &(0x7f0000ffb000/0x4000)=nil}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/196) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x88020}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="08002a027000fbdbdf25018d00000000000009410000004c00180000000000000000000000000000000000000038c3254aaed7d21a3ba86a704637000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4004045) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) dup2(r1, r4) dup3(r4, r2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0xbb67) 05:15:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r1 = shmget(0x1, 0x1000, 0x283, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:02 executing program 2: syz_read_part_table(0x8004, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xa79, 0x30, 0x1, r0}) 05:15:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}]}) [ 339.665793] FAULT_INJECTION: forcing a failure. [ 339.665793] name failslab, interval 1, probability 0, space 0, times 0 05:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/178, 0xb2}], 0x1, &(0x7f0000000280)=""/210, 0xd2}, 0x100) bind$netlink(r2, &(0x7f0000000380)={0x10, 0x0, 0x25dfdbfe, 0x800}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) [ 339.708415] CPU: 0 PID: 15150 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 339.715829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.725185] Call Trace: [ 339.727792] dump_stack+0x244/0x39d [ 339.731476] ? dump_stack_print_info.cold.1+0x20/0x20 [ 339.736707] should_fail.cold.4+0xa/0x17 [ 339.740787] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.745942] ? zap_class+0x640/0x640 [ 339.749695] ? __lock_acquire+0x62f/0x4c20 [ 339.753945] ? lock_downgrade+0x900/0x900 [ 339.758302] ? check_preemption_disabled+0x48/0x280 [ 339.763337] ? find_held_lock+0x36/0x1c0 [ 339.767429] ? expand_files.part.8+0x571/0x9a0 [ 339.767447] ? perf_trace_sched_process_exec+0x860/0x860 [ 339.767469] ? find_held_lock+0x36/0x1c0 [ 339.781562] __should_failslab+0x124/0x180 [ 339.781584] should_failslab+0x9/0x14 [ 339.781600] kmem_cache_alloc+0x2be/0x730 [ 339.781623] ? shmem_destroy_callback+0xc0/0xc0 [ 339.798460] shmem_alloc_inode+0x1b/0x40 [ 339.802530] alloc_inode+0x63/0x190 05:15:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x4000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) clock_gettime(0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x4, @name="096ed4869a1ae53cab1e891c8bd5c280e0f12f93f3cb93896c796675d0d820b2"}, 0x8, 0x691, 0x5}) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}, {0x0, 0x0, 0x800}], 0x2, &(0x7f00000002c0)) connect$l2tp(0xffffffffffffffff, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, {0xa, 0x0, 0x4, @mcast2, 0x6}}}, 0xfffffff7) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) rt_sigtimedwait(&(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x8) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000440)={0x5, 0x2, 0x2}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000400)=0x4) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback}) setsockopt$inet6_int(r1, 0x29, 0x38, &(0x7f00000001c0)=0xfffffffffffffffc, 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r2, &(0x7f0000000380), 0x1, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000500)={0x0, 0x0, {0x401, 0x4, 0x301f, 0x7, 0x8, 0x0, 0x3, 0x7}}) r4 = open(&(0x7f0000000000)='./file0\x00', 0xa0440, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000008c0)={0x5, 0x10, 0xfa00, {&(0x7f00000006c0), r5, 0x3}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000600)={0x80000000, 0x1, 0x3, 'queue0\x00', 0xaf9}) [ 339.806200] new_inode_pseudo+0x71/0x1a0 [ 339.810276] ? prune_icache_sb+0x1c0/0x1c0 [ 339.814523] ? _raw_spin_unlock+0x2c/0x50 [ 339.818691] new_inode+0x1c/0x40 [ 339.822109] shmem_get_inode+0xf1/0x920 [ 339.826102] ? shmem_encode_fh+0x340/0x340 [ 339.830369] ? lock_downgrade+0x900/0x900 [ 339.834555] ? lock_release+0xa00/0xa00 [ 339.838548] ? perf_trace_sched_process_exec+0x860/0x860 [ 339.844015] ? usercopy_warn+0x110/0x110 [ 339.848102] __shmem_file_setup.part.50+0x83/0x2a0 [ 339.853053] shmem_file_setup+0x65/0x90 [ 339.857040] __x64_sys_memfd_create+0x2af/0x4f0 [ 339.861711] ? memfd_fcntl+0x1910/0x1910 [ 339.865804] do_syscall_64+0x1b9/0x820 [ 339.869698] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 339.875066] ? syscall_return_slowpath+0x5e0/0x5e0 [ 339.879997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.884871] ? trace_hardirqs_on_caller+0x310/0x310 [ 339.889891] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 339.894936] ? prepare_exit_to_usermode+0x291/0x3b0 [ 339.899966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.904831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.910020] RIP: 0033:0x457669 [ 339.913214] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.932116] RSP: 002b:00007fca4ca53a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 339.939838] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 339.947109] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 339.954405] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 339.961675] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe [ 339.968943] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:03 executing program 2: syz_read_part_table(0xe201, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000280)=""/4096) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup(r1) dup2(r0, r3) 05:15:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}]}) 05:15:03 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x3, &(0x7f00000005c0)=[0xee00, 0xee00, 0xee01]) getuid() socket$unix(0x1, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x480300) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x9ba, 0x1, 0x8, 0x0, r2}, 0x2c) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) geteuid() ioctl$VT_RELDISP(r4, 0x5605) getuid() getpeername$inet6(r4, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x3e) pipe(&(0x7f00000004c0)) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000d80)=""/201) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r7, 0xc008ae88, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0xa500000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) shutdown(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000300)) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x113}}, 0x20) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="0e0000000600000000010002"], 0xc) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0x3, 0x4) 05:15:03 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9201, 0x0) 05:15:03 executing program 1 (fault-call:7 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x400000, 0x0) r3 = dup3(r1, r1, 0x80000) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f00000000c0)={r2, 0xeda, 0x100000000, r3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup2(r2, r2) dup3(r4, r1, 0x0) 05:15:03 executing program 2: syz_read_part_table(0x600000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0xb5, 0x80) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) write$cgroup_pid(r1, &(0x7f00000002c0)=r2, 0x12) select(0x40, &(0x7f0000000000)={0x4, 0x684e, 0x100, 0x5, 0x6, 0x101, 0x2, 0x100}, &(0x7f0000000040)={0x2, 0x6, 0x1, 0x2, 0x6, 0x40, 0x99f7, 0x8}, &(0x7f0000000080)={0xfffffffffffffffd, 0x6, 0xfffffffffffeffff, 0xac, 0x8, 0x4, 0x200, 0x4}, &(0x7f00000000c0)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1}) [ 340.598406] FAULT_INJECTION: forcing a failure. [ 340.598406] name failslab, interval 1, probability 0, space 0, times 0 [ 340.677937] CPU: 1 PID: 15206 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 340.685342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.694712] Call Trace: [ 340.697325] dump_stack+0x244/0x39d [ 340.701007] ? dump_stack_print_info.cold.1+0x20/0x20 [ 340.706222] should_fail.cold.4+0xa/0x17 [ 340.706247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 340.706288] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.706311] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 340.706326] ? retint_kernel+0x2d/0x2d [ 340.706345] ? trace_hardirqs_on_caller+0xc0/0x310 [ 340.706369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.706397] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 340.733862] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 340.733879] ? rcu_softirq_qs+0x20/0x20 [ 340.733903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.733936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.733955] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 340.734001] ? perf_trace_sched_process_exec+0x860/0x860 [ 340.734023] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.753472] __should_failslab+0x124/0x180 [ 340.753494] should_failslab+0x9/0x14 [ 340.753511] kmem_cache_alloc+0x2be/0x730 [ 340.753534] ? map_id_range_down+0x80/0x430 [ 340.753556] selinux_inode_alloc_security+0x107/0x3a0 [ 340.753574] ? inode_free_rcu+0x20/0x20 [ 340.753590] ? __put_user_ns+0x60/0x60 [ 340.753605] ? kasan_check_read+0x11/0x20 [ 340.753624] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 340.767986] security_inode_alloc+0x73/0xd0 [ 340.768010] inode_init_always+0x68f/0xd80 05:15:04 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x200380) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) recvmmsg(r0, &(0x7f00000014c0)=[{{&(0x7f0000000040)=@ax25, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/188, 0xbc}, {&(0x7f0000000180)=""/233, 0xe9}, {&(0x7f0000000280)=""/8, 0x8}], 0x3, &(0x7f0000000300)=""/47, 0x2f}, 0xfffffffffffffffa}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/123, 0x7b}, {&(0x7f0000000440)=""/8, 0x8}], 0x3, &(0x7f00000004c0)=""/4096, 0x1000}, 0x1}], 0x2, 0x0, &(0x7f0000001540)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001640)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={r1, r0, 0x0, 0x11, &(0x7f0000001680)='/\\securitycgroup\x00', 0x0}, 0x30) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001580)=0x0) sendto(r0, &(0x7f0000001700)="0dacdf204b811707ba0a4111142c4a489648fa0cbf9d716b9b51349dac43edf7295d9fc154697e2e18a9e2f2f34f94c0d052d3800bf158fe7fb39c5b5e0c132dad1edd3198613f796509220500630bead909053647968dc6a43453832cb659946377f92a817a94f802411ec8bbe602c0debc2b0bdcee80628290b5ad8b007378bf66970205eee0439fc7e880df25a350bcab9beb4c5d60b72b5cb5b49ba91f3ea2432f6fa3ae60", 0xa7, 0x4000040, &(0x7f0000001b00)=@sco={0x1f, {0x2, 0x0, 0x8, 0x1, 0x9, 0x6}}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001c00)={r3, r0, 0x0, 0xffffffffffffffce, &(0x7f0000001bc0)='&nodev\x00', r2}, 0xffffffffffffffc6) sched_rr_get_interval(r4, &(0x7f0000001600)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001a80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001a40)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000001ac0)={0xb, 0x10, 0xfa00, {&(0x7f0000001980), r5, 0x4}}, 0x18) socket$vsock_dgram(0x28, 0x2, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000001940)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001900)={&(0x7f0000001840)=ANY=[@ANYBLOB="7f000000", @ANYRES16=r6, @ANYBLOB="0c0026bd7000fbdbdf25080000004800030014000200626f6e6430000000000000000000000008000500ac1414aa14000600ff02000000000000000000000000000114000600fe80000000000000000000000000000b08000600ff0000003000030014000600ff010000000000000000000000000001080004000100000008000300000000000800010000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4801}, 0x4000004) [ 340.768043] ? get_nr_inodes+0x120/0x120 [ 340.768077] ? rcu_pm_notify+0xc0/0xc0 [ 340.768106] ? rcu_read_lock_sched_held+0x14f/0x180 [ 340.768123] ? kmem_cache_alloc+0x33a/0x730 [ 340.768149] ? shmem_alloc_inode+0x1b/0x40 [ 340.778336] ? shmem_destroy_callback+0xc0/0xc0 [ 340.778358] alloc_inode+0x80/0x190 [ 340.778375] new_inode_pseudo+0x71/0x1a0 [ 340.778390] ? prune_icache_sb+0x1c0/0x1c0 [ 340.778418] ? _raw_spin_unlock+0x2c/0x50 [ 340.778439] new_inode+0x1c/0x40 [ 340.778455] shmem_get_inode+0xf1/0x920 [ 340.778474] ? shmem_encode_fh+0x340/0x340 [ 340.786504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.794963] ? retint_kernel+0x2d/0x2d [ 340.794997] __shmem_file_setup.part.50+0x83/0x2a0 [ 340.795020] shmem_file_setup+0x65/0x90 [ 340.795039] __x64_sys_memfd_create+0x2af/0x4f0 [ 340.804194] ? memfd_fcntl+0x1910/0x1910 [ 340.804224] do_syscall_64+0x1b9/0x820 [ 340.804239] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 340.804259] ? syscall_return_slowpath+0x5e0/0x5e0 [ 340.804274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.804293] ? trace_hardirqs_on_caller+0x310/0x310 [ 340.804311] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 340.804354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.812372] ? prepare_exit_to_usermode+0x291/0x3b0 [ 340.812396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.812428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.812441] RIP: 0033:0x457669 05:15:04 executing program 2: syz_read_part_table(0x700, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:04 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/248) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000340)={r2, 0xf7, "4e29f298b303c538563f4bb16ab18e7133242806f744a476e5efa691d8a25b88f65092c07956d26e98d59d5ca03b15df5cbc43f8be7323474eaac972e64f853837d8342dca6a1e6069fc78a484f3ee34f96fa0fd072271d61ed9da93ab464d6bf2a6da5783bd875c9192b4afcad4e73a0a8138982fcc9b757253e91eff1d9eb71b9271caca3d6f8eaa9c6be2a6e7e695d79084087b00a88a18e61b17af53882b3b42412711b3deb16a0696407dabf6ba680e4635c61a20eb28316094bd678f8635f349e37da83f133bb8f67bd00a3ab21b7773262f03f2212ff384238d3da3a4c6da5d7822a5b80383dd14bdbdc66e911437191277314c"}, &(0x7f0000000280)=0xff) [ 340.812458] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.812467] RSP: 002b:00007fca4ca53a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 340.830351] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 340.830361] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 340.830373] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 340.830384] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe [ 340.830393] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:04 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) fchmod(0xffffffffffffffff, 0x2) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) dup2(0xffffffffffffffff, r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2100, 0x0) dup3(r1, r0, 0x0) r3 = getpid() write$P9_RGETLOCK(r2, &(0x7f0000000040)={0x2f, 0x37, 0x2, {0x1, 0x3, 0xfffffffffffffffc, r3, 0x11, '/dev/qat_adf_ctl\x00'}}, 0x2f) 05:15:04 executing program 2: syz_read_part_table(0xfeffffff00000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}]}) [ 341.489847] EXT4-fs: 8 callbacks suppressed [ 341.489861] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 05:15:04 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4204, r0, 0x201, &(0x7f0000000100)={&(0x7f00000000c0)=""/22, 0x16}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:15:04 executing program 1 (fault-call:7 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:04 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000040)={0x6, 0x1, @stop_pts=0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) 05:15:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80800, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000100)=""/107) dup3(r2, r1, 0x0) 05:15:04 executing program 2: syz_read_part_table(0xff01, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}]}) 05:15:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) syz_execute_func(&(0x7f0000000000)="40d1e3e30047702fc4e3796eec60c442c9923413cfc4018d649fbebcb4d4af477a00c482b0f3ce") [ 341.661082] FAULT_INJECTION: forcing a failure. [ 341.661082] name failslab, interval 1, probability 0, space 0, times 0 [ 341.701598] CPU: 0 PID: 15295 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 341.709014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.718373] Call Trace: [ 341.720982] dump_stack+0x244/0x39d [ 341.724678] ? dump_stack_print_info.cold.1+0x20/0x20 [ 341.729921] ? should_fail+0xaf1/0xd01 [ 341.733842] should_fail.cold.4+0xa/0x17 [ 341.737929] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 341.743057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.748642] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 341.754204] ? rcu_pm_notify+0xc0/0xc0 [ 341.758341] ? find_held_lock+0x36/0x1c0 [ 341.762485] ? perf_trace_sched_process_exec+0x860/0x860 [ 341.767991] __should_failslab+0x124/0x180 [ 341.772241] should_failslab+0x9/0x14 [ 341.776071] kmem_cache_alloc+0x2be/0x730 [ 341.780247] ? mpol_shared_policy_init+0x235/0x650 [ 341.785189] ? current_time+0x72/0x1b0 [ 341.789108] __d_alloc+0xc8/0xb90 [ 341.792598] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 341.797625] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 341.797643] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 341.797678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.813411] ? timespec64_trunc+0xea/0x180 [ 341.813431] ? inode_init_owner+0x340/0x340 [ 341.813450] ? _raw_spin_unlock+0x2c/0x50 [ 341.813472] ? current_time+0x131/0x1b0 [ 341.813493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.835706] ? __lockdep_init_map+0x105/0x590 [ 341.840309] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 341.845864] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 341.851423] d_alloc_pseudo+0x1d/0x30 [ 341.855245] alloc_file_pseudo+0x158/0x3f0 [ 341.859499] ? alloc_file+0x4d0/0x4d0 [ 341.863313] ? usercopy_warn+0x110/0x110 [ 341.867401] __shmem_file_setup.part.50+0x110/0x2a0 [ 341.872437] shmem_file_setup+0x65/0x90 [ 341.876426] __x64_sys_memfd_create+0x2af/0x4f0 [ 341.881107] ? memfd_fcntl+0x1910/0x1910 [ 341.885199] do_syscall_64+0x1b9/0x820 [ 341.889105] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 341.894483] ? syscall_return_slowpath+0x5e0/0x5e0 [ 341.899427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.904286] ? trace_hardirqs_on_caller+0x310/0x310 [ 341.909316] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 341.914347] ? prepare_exit_to_usermode+0x291/0x3b0 [ 341.919385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.924253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.929449] RIP: 0033:0x457669 [ 341.932673] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:15:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7e76, 0x232440) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 341.951595] RSP: 002b:00007fca4ca32a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 341.959322] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 341.966605] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 341.973886] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 341.981174] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe [ 341.988454] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:05 executing program 2: syz_read_part_table(0x1200000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x80800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:05 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x80000) r1 = memfd_create(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x2) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000140)="0fa065660f7dc2c4e145588e70c00000660f38810d0ea00000f32e0f0966baf80cb8ec28218cef66bafc0ced66b81d010f00d80f22993ef30fae60efb9800000c00f3235002000000f30", 0x4a}], 0x1, 0x21, &(0x7f00000001c0), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = dup2(r0, r4) dup3(r3, r5, 0x0) [ 342.151172] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000000000" or missing value 05:15:05 executing program 2: syz_read_part_table(0xff010000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 342.270828] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000000000" or missing value 05:15:05 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESDEC], @ANYRESDEC=r0, @ANYBLOB="9e090465e15f23476cc967e7af03e47e8d0090fa19ae862075cbb31a6ae2520018ec524390138da8852af2be7255efcd8c361a8f0fae1b44559889a8d935b2e0804304d18bb3af20bf86dc7db66b041fa08287f0d11a18eb1f0b4000af207d07e43e57050ae5aea5e801084819a408cb61594e76fcfd612e43bd16d1f67ee3a4726e", @ANYBLOB="680e7fce0174d7db6b1f8ff8aaaab7d1ceabb1270cc4af26018b766d2281bab66cf0c056454b236e3e1efa23b5b2c0f6a784001744fa787efbf0a85a5b08b58bab68a2eb2f11786e43d6c82d80af97", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRESOCT], @ANYRES16=0x0, @ANYRESOCT=0x0, @ANYRES16=r0, @ANYRES32=r0], @ANYRES32=r0, @ANYRES16=r0, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYRESOCT=r0, @ANYRES32=r0], @ANYRESDEC=r0, @ANYPTR, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES16=r0], @ANYPTR64, @ANYRES16=r0, @ANYBLOB="2e48c7de3b60653bbb45d86e5c31305afbc2ad10e4cb66a6a83d5e316294c8347c0c814ed79111737df44af743ce10d60a6600ab44307adc0a83206f66fd0e92e5530a88021395d6e4c408d36a4b9b2b34f8661ead50fede97a32f410c9ad67a8ddc1399b60d311983969de7418203827ae6c49e510d2515f8bca2fe52be6f024a421c9ec99b6b429d8c6a2f4c519ba9ffbe73308d866ef9f68dbad33071788749072b86136e9b4edf6fe49521f1c915de5a5eaf79651c5de106e6daba8586565c7486d570a1b9f81d10f6854a258fa823d71841301759aa69bc348bb300", @ANYBLOB="b381509c0d4d7eab6892b04d50a4c2873a898c78b6d2196713427656dd"]], 0x115) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:05 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x401}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r2, 0xba6}, &(0x7f0000000140)=0x8) 05:15:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}]}) 05:15:05 executing program 1 (fault-call:7 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = dup3(r0, r0, 0x80000) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x2, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:15:05 executing program 2: syz_read_part_table(0x40000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 342.760798] FAULT_INJECTION: forcing a failure. [ 342.760798] name failslab, interval 1, probability 0, space 0, times 0 [ 342.786399] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 342.797068] CPU: 1 PID: 15346 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 342.804456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.813820] Call Trace: [ 342.816436] dump_stack+0x244/0x39d [ 342.820098] ? dump_stack_print_info.cold.1+0x20/0x20 [ 342.825324] should_fail.cold.4+0xa/0x17 [ 342.829438] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.834551] ? rcu_pm_notify+0xc0/0xc0 [ 342.838494] ? zap_class+0x640/0x640 [ 342.842224] ? memset+0x31/0x40 [ 342.845531] ? zap_class+0x640/0x640 [ 342.849257] ? find_held_lock+0x36/0x1c0 [ 342.853370] ? snd_hda_gen_parse_auto_config+0x75f8/0xcec0 [ 342.859039] ? perf_trace_sched_process_exec+0x860/0x860 [ 342.859058] ? lock_downgrade+0x900/0x900 [ 342.859084] __should_failslab+0x124/0x180 [ 342.859105] should_failslab+0x9/0x14 [ 342.859121] kmem_cache_alloc+0x2be/0x730 [ 342.859148] __alloc_file+0xa8/0x470 [ 342.868732] ? file_free_rcu+0xd0/0xd0 [ 342.868751] ? d_instantiate+0x79/0xa0 [ 342.868770] ? lock_downgrade+0x900/0x900 [ 342.868795] ? kasan_check_read+0x11/0x20 [ 342.868809] ? do_raw_spin_unlock+0xa7/0x330 [ 342.868824] ? do_raw_spin_trylock+0x270/0x270 [ 342.868844] alloc_empty_file+0x72/0x170 [ 342.868864] alloc_file+0x5e/0x4d0 [ 342.917768] ? _raw_spin_unlock+0x2c/0x50 [ 342.921931] alloc_file_pseudo+0x261/0x3f0 [ 342.926179] ? alloc_file+0x4d0/0x4d0 [ 342.929988] ? usercopy_warn+0x110/0x110 [ 342.934066] __shmem_file_setup.part.50+0x110/0x2a0 [ 342.939099] shmem_file_setup+0x65/0x90 [ 342.943079] __x64_sys_memfd_create+0x2af/0x4f0 [ 342.947757] ? memfd_fcntl+0x1910/0x1910 [ 342.951844] do_syscall_64+0x1b9/0x820 [ 342.955737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 342.961110] ? syscall_return_slowpath+0x5e0/0x5e0 [ 342.966042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.970894] ? trace_hardirqs_on_caller+0x310/0x310 [ 342.975915] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 342.980942] ? prepare_exit_to_usermode+0x291/0x3b0 [ 342.985967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.990823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.996017] RIP: 0033:0x457669 [ 342.999243] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.018168] RSP: 002b:00007fca4ca53a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 343.025887] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 343.033168] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 343.040447] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 343.047732] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe [ 343.055012] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:06 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(0xffffffffffffff9c, &(0x7f0000003c00)=[{{&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)=""/72, 0x48}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/20, 0x14}], 0x3, &(0x7f00000002c0)=""/125, 0x7d}, 0x4}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/29, 0x1d}, {&(0x7f0000000380)=""/235, 0xeb}], 0x2}, 0x401}, {{&(0x7f00000004c0)=@ax25, 0x80, &(0x7f0000000880)=[{&(0x7f0000000540)=""/28, 0x1c}, {&(0x7f0000000580)=""/214, 0xd6}, {&(0x7f0000000680)=""/254, 0xfe}, {&(0x7f0000000780)=""/163, 0xa3}, {&(0x7f0000000840)}], 0x5, &(0x7f0000000900)}, 0x8}, {{&(0x7f0000000940)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001cc0)=[{&(0x7f00000009c0)=""/32, 0x20}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/149, 0x95}, {&(0x7f0000001ac0)=""/16, 0x10}, {&(0x7f0000001b00)=""/255, 0xff}, {&(0x7f0000001c00)=""/180, 0xb4}], 0x6}, 0x76a1}, {{&(0x7f0000001d40)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001dc0)=""/41, 0x29}, {&(0x7f0000001e00)=""/204, 0xcc}], 0x2, &(0x7f0000001f40)=""/4096, 0x1000}}, {{&(0x7f0000002f40)=@hci, 0x80, &(0x7f0000003200)=[{&(0x7f0000002fc0)=""/165, 0xa5}, {&(0x7f0000003080)=""/184, 0xb8}, {&(0x7f0000003140)=""/129, 0x81}], 0x3}, 0x9}, {{&(0x7f0000003240)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000003480)=[{&(0x7f00000032c0)=""/146, 0x92}, {&(0x7f0000003380)=""/121, 0x79}, {&(0x7f0000003400)=""/16, 0x10}, {&(0x7f0000003440)=""/50, 0x32}], 0x4}, 0x8000}, {{&(0x7f00000034c0)=@l2, 0x80, &(0x7f0000003600)=[{&(0x7f0000003540)=""/167, 0xa7}], 0x1, &(0x7f0000003640)=""/4, 0x4}, 0x1}, {{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003680)=""/55, 0x37}, {&(0x7f00000036c0)=""/179, 0xb3}, {&(0x7f0000003780)=""/184, 0xb8}, {&(0x7f0000003840)=""/99, 0x63}], 0x4, &(0x7f0000003900)=""/169, 0xa9}, 0x200}, {{&(0x7f00000039c0)=@alg, 0x80, &(0x7f0000003b40)=[{&(0x7f0000003a40)=""/217, 0xd9}], 0x1, &(0x7f0000003b80)=""/71, 0x47}, 0x80}], 0xa, 0x100, &(0x7f0000003e80)={0x0, 0x1c9c380}) clock_gettime(0x0, &(0x7f0000003f00)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000004000)={&(0x7f0000003ec0)={0x1d, r1}, 0x10, &(0x7f0000003fc0)={&(0x7f0000003f40)={0x7, 0x20, 0x7, {}, {r2, r3/1000+30000}, {0x1, 0x3, 0x4, 0x5}, 0x1, @can={{0x3, 0x3, 0x80, 0x2}, 0x4, 0x2, 0x0, 0x0, "dd4b8db3db5a2ece"}}, 0x48}, 0x1, 0x0, 0x0, 0x40005}, 0x800) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) 05:15:06 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x1fd, 0x0, 0x4, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) dup2(0xffffffffffffffff, r1) dup3(r1, r0, 0x0) 05:15:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x100, 0x4) 05:15:06 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xfe) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x82, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x9}}, 0x18) 05:15:06 executing program 2: syz_read_part_table(0x20000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:15:06 executing program 1 (fault-call:7 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}]}) 05:15:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 05:15:06 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000080)={'vlan0\x00', {0x2, 0x4e21, @rand_addr=0x8}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:15:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 343.452671] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value [ 343.487709] FAULT_INJECTION: forcing a failure. [ 343.487709] name failslab, interval 1, probability 0, space 0, times 0 05:15:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x60002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x900, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000002c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x49c}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000200)={r4, r5}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r7 = dup2(r0, r6) r8 = dup3(r6, r1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r8, 0x1, &(0x7f0000000140)={0x98, 0x8, 0x1, "9d7be438ed5cbfe5878ec2bf9ff488190a72fa69664d307c0fb2192f146e772a00aaf0b03c4bb9eadb1c47a41af359e03be79edfc485919ada28d3ed243296a693a7414cab7de6e16a1b02ae33aa077ffaa48976eb9879f6d8f2b85d2f2d979124e8e2fdd5bb9feb102aded685df9093a2dd842eba0cbe28da2328b4b7f14bab0541ec8ed9ecbbce9a7601a507bae22d451042924279a661"}) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x1) [ 343.559733] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value [ 343.582055] CPU: 0 PID: 15398 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 343.589468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.598833] Call Trace: [ 343.601449] dump_stack+0x244/0x39d [ 343.605106] ? dump_stack_print_info.cold.1+0x20/0x20 [ 343.610316] ? lock_release+0x51d/0xa00 [ 343.614323] should_fail.cold.4+0xa/0x17 [ 343.618401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.623515] ? rcu_pm_notify+0xc0/0xc0 [ 343.627427] ? zap_class+0x640/0x640 [ 343.631156] ? memset+0x31/0x40 [ 343.634446] ? zap_class+0x640/0x640 [ 343.638170] ? find_held_lock+0x36/0x1c0 [ 343.642242] ? kthread_insert_work+0x118/0x2c0 [ 343.646844] ? perf_trace_sched_process_exec+0x860/0x860 [ 343.652299] ? lock_downgrade+0x900/0x900 [ 343.656464] __should_failslab+0x124/0x180 [ 343.660705] should_failslab+0x9/0x14 [ 343.664512] kmem_cache_alloc+0x2be/0x730 [ 343.668693] __alloc_file+0xa8/0x470 [ 343.672415] ? file_free_rcu+0xd0/0xd0 [ 343.676311] ? d_instantiate+0x79/0xa0 [ 343.680208] ? lock_downgrade+0x900/0x900 [ 343.684366] ? kasan_check_read+0x11/0x20 [ 343.688520] ? do_raw_spin_unlock+0xa7/0x330 [ 343.692934] ? do_raw_spin_trylock+0x270/0x270 [ 343.697531] alloc_empty_file+0x72/0x170 [ 343.701604] alloc_file+0x5e/0x4d0 [ 343.705144] ? _raw_spin_unlock+0x2c/0x50 [ 343.709302] alloc_file_pseudo+0x261/0x3f0 [ 343.713547] ? alloc_file+0x4d0/0x4d0 [ 343.717358] ? usercopy_warn+0x110/0x110 [ 343.721437] __shmem_file_setup.part.50+0x110/0x2a0 [ 343.726465] shmem_file_setup+0x65/0x90 [ 343.730452] __x64_sys_memfd_create+0x2af/0x4f0 [ 343.735124] ? memfd_fcntl+0x1910/0x1910 [ 343.739185] ? memfd_fcntl+0x1910/0x1910 [ 343.743254] ? do_syscall_64+0x179/0x820 [ 343.747322] ? __x64_sys_memfd_create+0x6/0x4f0 [ 343.752009] do_syscall_64+0x1b9/0x820 [ 343.755904] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 343.761496] ? syscall_return_slowpath+0x5e0/0x5e0 [ 343.766432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.771286] ? trace_hardirqs_on_caller+0x310/0x310 [ 343.776310] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 343.781338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.786883] ? prepare_exit_to_usermode+0x291/0x3b0 [ 343.791921] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.796779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.801983] RIP: 0033:0x457669 [ 343.805186] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.824093] RSP: 002b:00007fca4ca53a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 343.831804] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 343.839071] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 343.846340] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 343.853608] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe 05:15:07 executing program 2: syz_read_part_table(0x4000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 343.860879] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) write$tun(r0, &(0x7f0000000000)={@val={0x0, 0xe8ff}, @void, @llc={@llc={0xff, 0x80, 'I', "603d0d5b8ab79c73533c11caaa94b068dc4ab1f2bfb1d304896f8c27650bd07facd4d514ac2101005261"}}}, 0x31) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}]}) 05:15:07 executing program 1 (fault-call:7 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$inet6(0xa, 0xf, 0x8000) write$P9_RSETATTR(r0, &(0x7f0000000080)={0x7, 0x1b, 0x1}, 0x7) accept$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) 05:15:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x800020006, 0x1, 0x2, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) dup3(r2, r1, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000000)=0x7) 05:15:07 executing program 2: syz_read_part_table(0xf0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:07 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0xaf49, 0xfff, 0xffffffffffffff81, 0x40}) [ 344.176121] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value [ 344.217643] FAULT_INJECTION: forcing a failure. [ 344.217643] name failslab, interval 1, probability 0, space 0, times 0 [ 344.288628] CPU: 1 PID: 15455 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 344.296045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.305417] Call Trace: [ 344.308038] dump_stack+0x244/0x39d [ 344.311713] ? dump_stack_print_info.cold.1+0x20/0x20 [ 344.316965] ? is_bpf_text_address+0xd3/0x170 [ 344.321491] should_fail.cold.4+0xa/0x17 [ 344.325576] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 344.330709] ? save_stack+0xa9/0xd0 [ 344.334346] ? save_stack+0x43/0xd0 [ 344.337979] ? kasan_kmalloc+0xc7/0xe0 [ 344.341868] ? kasan_slab_alloc+0x12/0x20 [ 344.346018] ? kmem_cache_alloc+0x12e/0x730 [ 344.350346] ? __alloc_file+0xa8/0x470 [ 344.354240] ? alloc_empty_file+0x72/0x170 [ 344.358493] ? find_held_lock+0x36/0x1c0 [ 344.362563] ? ipv4_blackhole_mtu+0x48/0xf0 [ 344.366901] ? perf_trace_sched_process_exec+0x860/0x860 [ 344.372366] ? check_preemption_disabled+0x48/0x280 [ 344.377396] __should_failslab+0x124/0x180 [ 344.381659] should_failslab+0x9/0x14 [ 344.385466] kmem_cache_alloc+0x2be/0x730 [ 344.389625] ? rcu_read_lock_sched_held+0x14f/0x180 [ 344.394677] selinux_file_alloc_security+0xb4/0x190 [ 344.399704] security_file_alloc+0x4c/0xa0 [ 344.403948] __alloc_file+0x12a/0x470 [ 344.407757] ? file_free_rcu+0xd0/0xd0 [ 344.411665] ? d_instantiate+0x79/0xa0 [ 344.415568] ? lock_downgrade+0x900/0x900 [ 344.419730] ? kasan_check_read+0x11/0x20 [ 344.423880] ? do_raw_spin_unlock+0xa7/0x330 [ 344.428287] ? do_raw_spin_trylock+0x270/0x270 [ 344.432896] alloc_empty_file+0x72/0x170 [ 344.436988] alloc_file+0x5e/0x4d0 [ 344.440529] ? _raw_spin_unlock+0x2c/0x50 [ 344.444691] alloc_file_pseudo+0x261/0x3f0 [ 344.448936] ? alloc_file+0x4d0/0x4d0 [ 344.452745] ? usercopy_warn+0x110/0x110 [ 344.456819] __shmem_file_setup.part.50+0x110/0x2a0 [ 344.461843] shmem_file_setup+0x65/0x90 [ 344.465823] __x64_sys_memfd_create+0x2af/0x4f0 [ 344.470495] ? memfd_fcntl+0x1910/0x1910 [ 344.474574] do_syscall_64+0x1b9/0x820 [ 344.478465] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 344.483836] ? syscall_return_slowpath+0x5e0/0x5e0 [ 344.488770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.493621] ? trace_hardirqs_on_caller+0x310/0x310 [ 344.498644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 344.503684] ? prepare_exit_to_usermode+0x291/0x3b0 [ 344.508708] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.513564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.518757] RIP: 0033:0x457669 [ 344.521964] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.540871] RSP: 002b:00007fca4ca32a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 344.548584] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457669 [ 344.555854] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004bc5a2 [ 344.563123] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 344.570398] R10: 0000000020000218 R11: 0000000000000246 R12: fffffffffffffffe [ 344.577687] R13: 00000000004bc5a2 R14: 00000000004da0e0 R15: 0000000000000005 05:15:07 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x8602, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000280)="e82946963b067ab09ff277e01e5ba9f4ec290f370d5b04f26ba1caa7329f0e08ba157ec64f89010aa70e139d522dd8d4b3a233c9c8ff09f8c06acc7dd116a59c7117f9b9e04833643fb0335f1a1a362df70976f68fe2c313d5843c67a796ce7575b63948f71a9be1a43dda016a64f3fd23c8cadee4b7aa97878c5303857c04a1f8a48c0137b766f02b4e", 0x8a}], 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1f, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@generic={0xf08, 0x7, 0x4, 0xfffffffffffffff8, 0x20}, @generic={0x6, 0x2, 0xffff, 0x0, 0x100000000}, @alu={0x7, 0x8000, 0x9, 0x2, 0xb, 0x0, 0x1}, @generic={0x9, 0x8, 0x0, 0x6, 0x3}, @exit, @alu={0x4, 0x3, 0xd, 0x6, 0x1, 0x48, 0x4}, @map={0x18, 0x7, 0x1, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x644, 0x2c, &(0x7f0000000100)=""/44, 0x41100, 0x0, [], 0x0, 0x8}, 0x48) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9201, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0x6) [ 344.639933] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value 05:15:08 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) accept(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x80) r2 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in6=@local, 0x4e22, 0x0, 0x4e24, 0x8, 0x2, 0x20, 0x0, 0xfe, r1, r2}, {0xe85, 0x0, 0x1, 0x1000, 0xad, 0xd65, 0xffff, 0x60000000000000}, {0x0, 0x6, 0x5, 0x4}, 0x3, 0x0, 0x1, 0x0, 0x3, 0x2}, {{@in6=@mcast1, 0x4d3, 0xff}, 0x2, @in6, 0x3504, 0x4, 0x0, 0x4, 0xbd9, 0x1000, 0x100000001}}, 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:15:08 executing program 2: syz_read_part_table(0xffffffff00000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:08 executing program 3: syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5366b4f7639eea1c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x4000000}, 0xc040) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 05:15:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}]}) 05:15:08 executing program 1 (fault-call:7 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x3, 0x7) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x2, 0x7000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200043) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) getrandom(&(0x7f0000000280)=""/207, 0xcf, 0x0) 05:15:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 345.008147] FAULT_INJECTION: forcing a failure. [ 345.008147] name failslab, interval 1, probability 0, space 0, times 0 [ 345.020815] CPU: 0 PID: 15502 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 345.028201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.037562] Call Trace: [ 345.040174] dump_stack+0x244/0x39d [ 345.040201] ? dump_stack_print_info.cold.1+0x20/0x20 [ 345.040224] ? lock_downgrade+0x900/0x900 [ 345.040255] should_fail.cold.4+0xa/0x17 [ 345.049066] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.049091] ? up_write+0x7b/0x220 [ 345.049110] ? down_write_nested+0x130/0x130 [ 345.070334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 345.075881] ? __generic_file_write_iter+0x1bd/0x630 [ 345.081005] ? find_held_lock+0x36/0x1c0 [ 345.085091] ? perf_trace_sched_process_exec+0x860/0x860 [ 345.090545] ? vfs_write+0x2f3/0x560 [ 345.094264] ? lock_downgrade+0x900/0x900 [ 345.098418] __should_failslab+0x124/0x180 [ 345.102671] should_failslab+0x9/0x14 [ 345.106481] kmem_cache_alloc+0x2be/0x730 [ 345.110633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.116181] ? check_preemption_disabled+0x48/0x280 [ 345.121209] getname_flags+0xd0/0x590 [ 345.125019] getname+0x19/0x20 [ 345.128217] do_sys_open+0x383/0x700 [ 345.131938] ? filp_open+0x80/0x80 [ 345.135486] ? trace_hardirqs_off_caller+0x310/0x310 [ 345.140589] ? do_sys_ftruncate+0x449/0x550 [ 345.144921] __x64_sys_open+0x7e/0xc0 [ 345.148731] do_syscall_64+0x1b9/0x820 [ 345.152621] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 345.158001] ? syscall_return_slowpath+0x5e0/0x5e0 [ 345.162936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.167785] ? trace_hardirqs_on_caller+0x310/0x310 [ 345.172806] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 345.177831] ? prepare_exit_to_usermode+0x291/0x3b0 [ 345.182856] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.187727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.192936] RIP: 0033:0x4112a1 05:15:08 executing program 2: syz_read_part_table(0x500000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 345.196140] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 345.215068] RSP: 002b:00007fca4ca53a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 345.222783] RAX: ffffffffffffffda RBX: 00007fca4ca546d4 RCX: 00000000004112a1 [ 345.230055] RDX: 00007fca4ca53baa RSI: 0000000000000002 RDI: 00007fca4ca53ba0 [ 345.237325] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 345.244601] R10: 0000000000000075 R11: 0000000000000293 R12: 00007fca4ca546d4 [ 345.251878] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000000000001 [ 345.291259] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000000" or missing value 05:15:08 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000040)={{0x4, @addr=0x10001}, 0x8, 0x80000000, 0x945}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000140)=@req={0x8, 0xce0, 0x0, 0x7f}, 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xfb, "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"}, &(0x7f0000000180)=0x103) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x8, 0x6, [0x9, 0x25c38fae, 0x3, 0x7, 0x2, 0x100]}, &(0x7f0000000200)=0x14) dup3(r1, r0, 0x0) 05:15:08 executing program 1 (fault-call:7 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='rose0\x00') [ 345.492710] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000000" or missing value 05:15:08 executing program 2: syz_read_part_table(0x626, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 345.646177] FAULT_INJECTION: forcing a failure. [ 345.646177] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.658033] CPU: 0 PID: 15537 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 345.665400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.674788] Call Trace: [ 345.677402] dump_stack+0x244/0x39d [ 345.681061] ? dump_stack_print_info.cold.1+0x20/0x20 [ 345.686274] ? zap_class+0x640/0x640 [ 345.690005] ? shmem_unused_huge_scan+0x180/0x180 [ 345.694871] should_fail.cold.4+0xa/0x17 [ 345.698962] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.704079] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 345.709111] ? iov_iter_advance+0x306/0x13f0 [ 345.713533] ? zap_class+0x640/0x640 [ 345.717271] ? mark_held_locks+0x130/0x130 [ 345.721526] ? find_held_lock+0x36/0x1c0 [ 345.725612] ? generic_file_write_iter+0x35c/0x6b0 [ 345.730579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.736131] ? should_fail+0x22d/0xd01 [ 345.740035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.745161] __alloc_pages_nodemask+0x366/0xea0 [ 345.749843] ? up_write+0x7b/0x220 [ 345.753414] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 345.758644] ? find_held_lock+0x36/0x1c0 [ 345.762757] ? trace_hardirqs_off+0xb8/0x310 [ 345.767188] cache_grow_begin+0xa5/0x8c0 [ 345.771266] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 345.776822] ? check_preemption_disabled+0x48/0x280 [ 345.781861] kmem_cache_alloc+0x66b/0x730 [ 345.786024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.791584] getname_flags+0xd0/0x590 [ 345.795406] getname+0x19/0x20 [ 345.798608] do_sys_open+0x383/0x700 [ 345.802380] ? filp_open+0x80/0x80 [ 345.805944] ? trace_hardirqs_off_caller+0x310/0x310 [ 345.811055] ? do_sys_ftruncate+0x449/0x550 [ 345.815398] __x64_sys_open+0x7e/0xc0 [ 345.819217] do_syscall_64+0x1b9/0x820 [ 345.823116] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 345.828498] ? syscall_return_slowpath+0x5e0/0x5e0 [ 345.833437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.838299] ? trace_hardirqs_on_caller+0x310/0x310 [ 345.843328] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 345.848357] ? prepare_exit_to_usermode+0x291/0x3b0 [ 345.853423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.858299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.863495] RIP: 0033:0x4112a1 [ 345.866699] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 345.885606] RSP: 002b:00007fca4ca53a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 05:15:09 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}]}) 05:15:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x7, 0x20, 0x65af, 0xb3}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x1, 0xf8, 0x8000, 0x57d, 0x8000, 0x100, 0x4, 0x81, r1}, &(0x7f00000000c0)=0x20) 05:15:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x1050c1) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x20, 0x0, [], {0x0, @reserved}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) r4 = dup2(r0, r3) r5 = dup3(r3, r1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000280)={'nat\x00', 0xcf, "39038db7c431fd96e6f00a9e91d3eba6babb6eb86bd50e9eaaf24138c5647b0e30bb94ce3b1d497fa5fc7d43cb6f2d6de1b46c58aac1256ad856864d1e1b2fa48aaa89e1d2b5fa794dcea8aebb8fdbcf68e5c4fa0280ed250b95df2c0b7f79389e513f6af9e2d3025ac013090b57f65a5735b45612cc55c0ff4d2ba4a48729e192237f3d2c580c37f3f3bec724ccef3a5493e82c2ff8b77350bbe5f9d38e7bfeb80e13b47dbdb8a852f09a3efff66b3fb6fccc7fa859df95a2e0d51e708b66da5ca021f39e3cab65a51606dc45bb6f"}, &(0x7f0000000380)=0xf3) setsockopt$inet6_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000200)="5983baa9ddf0ceda", 0x8) [ 345.893337] RAX: ffffffffffffffda RBX: 00007fca4ca546d4 RCX: 00000000004112a1 [ 345.900616] RDX: 00007fca4ca53baa RSI: 0000000000000002 RDI: 00007fca4ca53ba0 [ 345.907897] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 345.915183] R10: 0000000000000075 R11: 0000000000000293 R12: 00007fca4ca546d4 [ 345.922453] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000000000001 [ 345.969624] Dev loop2: unable to read RDB block 3 [ 345.974544] loop2: unable to read partition table 05:15:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x1009, 0x4) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000280)=""/4096) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000080)=0x381) [ 346.011730] loop1: p1 p2 p3 p4 < > [ 346.018379] loop2: partition table beyond EOD, truncated [ 346.036308] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 05:15:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}]}) 05:15:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x301c00) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f00000000c0)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f00000001c0)=""/31) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000200)=0xe8) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYBLOB="84000000150000002bbd7000fedbdf2500000000000000000000000000000001000000000000000000000000000000004e21008a4e23eadd020000202c000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="b06b6e00000000002c0013007f000001000000000000000000000000000000000000000000020000000800180000000000"], 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x0) r7 = dup2(r0, r4) dup3(r7, r1, 0x2000000) [ 346.193426] Dev loop2: unable to read RDB block 3 [ 346.209448] loop2: unable to read partition table [ 346.237420] loop2: partition table beyond EOD, truncated 05:15:09 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x5, 0x261, 0x1f, 0x80, @time={0x0, 0x1c9c380}, {0x4c}, {0xffffffff, 0x5fa5}, @connect={{0x5, 0x100000001}, {0xfffffffffffff003, 0x2}}}, {0x100000001, 0x100000001, 0x18b2, 0x6713, @tick=0xe, {0x3, 0x2}, {0x5, 0x5}, @raw8={"7c67c6a5e4fcf59d44f507eb"}}, {0x6, 0x0, 0x3, 0x2ef, @tick=0x400, {0xbec5, 0x1}, {0x0, 0x3f}, @result={0x1f, 0x100000001}}, {0x0, 0x32, 0x1, 0x2, @time, {0x2, 0x3}, {0xe58, 0x6de44739}, @queue={0x2, {0x3b32, 0x8}}}, {0x7, 0x10000, 0x4, 0x80, @tick=0x5, {0x3, 0xfc5}, {0x2ee, 0x10001}, @note={0xb21c, 0x1000, 0xd7, 0x6, 0x4}}, {0x7, 0x1, 0x7f, 0x100000000, @tick=0x800000, {0xff, 0x7}, {0x3a, 0x8}, @result={0xe1b, 0x9}}, {0x10000, 0x8, 0x3, 0xfffffffffffffffd, @tick=0x8, {0x0, 0x400}, {0x5, 0xfff}, @addr={0x9, 0x7}}], 0x150) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) [ 346.298267] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 05:15:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:09 executing program 2: syz_read_part_table(0x1200, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000040)={&(0x7f0000000000)=[0xfffffffffffffffa, 0x800, 0x8, 0xdfb2], 0x4, 0x1, 0xf8a, 0x7, 0x10001, 0x0, {0x100, 0x0, 0x1, 0x2, 0x1f, 0x600000, 0x0, 0x9, 0x1ff, 0xb1, 0x1, 0x400, 0xffffffffffff8001, 0x7, "d729602250305ae14b6e6e0df022c21162c63dc314440cbdc22d3860d40350bc"}}) 05:15:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}]}) [ 346.650485] Dev loop2: unable to read RDB block 9 [ 346.684835] loop2: unable to read partition table [ 346.707957] loop2: partition table beyond EOD, truncated [ 346.728859] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 346.764379] loop1: p1 p2 p3 p4 < > [ 346.836761] EXT4-fs: 2 callbacks suppressed [ 346.836776] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value [ 346.862999] Dev loop2: unable to read RDB block 9 [ 346.868188] loop2: unable to read partition table [ 346.894688] loop2: partition table beyond EOD, truncated [ 346.917376] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 347.013059] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 05:15:10 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100) 05:15:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0xfffffffffffffffc, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)) 05:15:10 executing program 0: inotify_init1(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x82000) syz_extract_tcp_res(&(0x7f00000000c0), 0xa068, 0xac2f) write$selinux_load(r2, &(0x7f00000002c0)={0xf97cff8c, 0x8, 'SE Linux', "12baedb38000b42ca031954a2233a298ce14a7de18748ac36b6ea3fcfcb04e894568b8571c077c2d1806c8f01bc88bc81f205bae333830d6821bff066629b274c631f84241f1edbb6d600232faa13da82b6678a257fd3221847810f13ab2853d1afc26c18db459b4a3c0bec8d57d2cd321015b3114cb403497a29a934ba99475fd006dccfe19bc303586edb7dbd8e1ba1725368298da5bc919af66497bbd239a7f51a1f69d4a1e4c0b2eb799cbe9c3c9bf7141cbaa9ba551820244900277dccddfeca4aeb60f2823b33b65d7c510ed75bbf03c88ade11c7532df87a100478b45"}, 0xf0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x101080}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, 0x0, 0x210, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8b6b}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xc30}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1dd}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x71}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffff824}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r0, r1, 0xfffffffffffffffc) 05:15:10 executing program 2: syz_read_part_table(0x400000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}]}) 05:15:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0xffffffffffffff00, 0x1, 0x7, 0x1000, 0x3f6a}, 0xc) 05:15:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:15:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0x4, 0xb990}, 0x0, 0x200, 0x7, {0x80, 0x8}, 0x1, 0x6}) 05:15:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xc200, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 347.431178] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value 05:15:10 executing program 2: syz_read_part_table(0x80040000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}]}) 05:15:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0x6, 0x20000800, 0x1000, 0xfffffffffffffffa, 0x400, 0x1, 0xbe, 0x4, 0x6, 0x1}, 0x10) [ 347.750721] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value [ 347.880376] loop1: p1 p3 p4 [ 347.942904] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value 05:15:11 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x5020, &(0x7f0000000140)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@access_any='access=any'}, {@cache_fscache='cache=fscache'}, {@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}, {@privport='privport'}], [{@fsuuid={'fsuuid', 0x3d, {[0x77, 0x37, 0x77, 0x38, 0x7f, 0x37, 0x76, 0x62], 0x2d, [0x72, 0x30, 0x37, 0x33], 0x2d, [0x7a, 0x63, 0x7b, 0x7b], 0x2d, [0x39, 0x0, 0x7f, 0x3f], 0x2d, [0x0, 0x62, 0x34, 0x0, 0x76, 0x36, 0x65, 0x77]}}}, {@seclabel='seclabel'}]}}) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x4, 0x301000) 05:15:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r2, 0x0) 05:15:11 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) fcntl$lock(r0, 0x27, &(0x7f0000000100)={0x1, 0x2, 0x10001, 0x7, r1}) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0x9201, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x4c927bff, 0x4}, 0x4}, 0x10) 05:15:11 executing program 2: syz_read_part_table(0xf6ffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x11c35, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}]}) [ 348.309270] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 05:15:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x800000000000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'dummy0\x00', 0x2}, 0x18) r1 = getpgid(0x0) getpgid(r1) 05:15:11 executing program 2: syz_read_part_table(0xfeffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x1, @loopback, 0xfc}}, [0x1, 0xd2d4, 0x76, 0x9, 0xffffffff80000001, 0x4, 0x3f2f, 0x7ff, 0x6, 0x2, 0x6, 0x400, 0x5, 0x6, 0x9]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000000c0)={r4, 0x9}, &(0x7f0000000280)=0x8) r5 = dup3(r2, r1, 0x0) signalfd(r5, &(0x7f0000000000)={0x6}, 0x8) [ 348.475616] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 05:15:11 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000080)) 05:15:11 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f00000000c0)={0x4, 0x101000}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) prctl$PR_SET_DUMPABLE(0x4, 0x2) 05:15:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}]}) 05:15:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x2) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000140)=0x1572) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x2, 0xf7}, {0x2, 0x4}]}, 0x14, 0x2) dup3(r3, r2, 0x80000000000000) 05:15:12 executing program 2: syz_read_part_table(0xfffffffe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:12 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000080)={{&(0x7f0000000280)=""/4096, 0x1000}, &(0x7f0000000040), 0x2}, 0x20) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@local, @rand_addr=0x4}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 348.969912] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 05:15:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r0) dup3(r2, r1, 0x0) [ 349.146922] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 05:15:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x3a5, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:12 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x9, 0x1) openat$cgroup(r0, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x1300, 0x297ef) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7fe000, 0x220b00) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x84000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0x9201, 0x0) 05:15:12 executing program 2: syz_read_part_table(0x28, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}]}) 05:15:12 executing program 2: syz_read_part_table(0xc, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) dup3(r2, r1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000000)) [ 349.600891] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 05:15:13 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000080)={{0x7, 0xfffffffffffff246}, 'port1\x00', 0x0, 0x40, 0x1, 0x3, 0x9f, 0x8, 0x8}) 05:15:13 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x3f, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r0, r2) dup3(r2, r1, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000140)={0x0, @reserved}) 05:15:13 executing program 2: syz_read_part_table(0x6000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 349.827018] loop1: p1 p2 p3 p4 < > 05:15:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}]}) 05:15:13 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) [ 350.350902] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 350.387694] print_req_error: 549 callbacks suppressed [ 350.387705] print_req_error: I/O error, dev loop1, sector 301 05:15:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x11be4, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl(r0, 0x4, &(0x7f0000000280)="cda28c9a5c7c3ac6ee79b2dfde2dd80845416c14deb23fee1c967ac60ececdfea1eb89c3bf94f783f4e0e6879da785a0e2ba3881be1e65df90814b113c321deb10465d4a6cba02f6a8e318b8f97202e135ee528f3bd9fcf864e743d0ad34c348fa10963e11b53085c6b631a7d98f88ba038adbd3698973c761cbec48bef65753827156e801f2ec87e83a227008394aca688f4e9c0f65aec5001785789fded1dec5cb1c6287e6a2f13b513287896c1386df578e77371c87a33ed38122283824fb0fcdf2b00cfe0cb203d49849cf70687b3ca638f40364fa0705905f1433a72c4fa2ef952b3af1d4a4f5db53b002ca") r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:15:13 executing program 3: syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) r0 = getegid() setgid(r0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) signalfd4(r1, &(0x7f00000000c0)={0x9}, 0x8, 0x80000) mq_getsetattr(r1, &(0x7f0000000040)={0x81, 0x200, 0x5, 0x80000001, 0xfffffffffffffffb, 0x3, 0x400, 0x4}, &(0x7f0000000080)) ioctl$sock_bt(r1, 0xdd1f, &(0x7f0000000140)="0bb5f9fb7bdbdc185f31c6112451e0751c0fcb97ca232dfe8809518b836907463490198e88d46e88f1323a03dd0dad031fbcd5d6dd1b7f8f2efff91d81c4bee91c6c5b2e050a826689ab8eaa56cbcea9485952e8b19ee1fc1a0bae8e621113392fed2aa5e8a03a2b09897857ff120ff327ceb5650570ec7c0c1d4b3162be59a8fd65a3871319f2a28e2ea4ecf1c8aca206b09b13627052e5899cf0449596eb18a97c28a9f25d6ce14ad3e2cd32eed9199ae78ef98a") syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) 05:15:13 executing program 2: syz_read_part_table(0x6b6b6b00, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}]}) [ 350.399169] print_req_error: I/O error, dev loop1, sector 1 [ 350.399342] print_req_error: I/O error, dev loop1, sector 1 [ 350.410710] buffer_io_error: 546 callbacks suppressed [ 350.410721] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 350.424742] print_req_error: I/O error, dev loop1, sector 101 [ 350.431112] Buffer I/O error on dev loop1p2, logical block 0, async page read [ 350.438434] print_req_error: I/O error, dev loop1, sector 105 [ 350.453954] Buffer I/O error on dev loop1p2, logical block 1, async page read [ 350.461549] print_req_error: I/O error, dev loop1, sector 101 [ 350.463051] print_req_error: I/O error, dev loop1, sector 301 [ 350.467460] Buffer I/O error on dev loop1p2, logical block 0, async page read [ 350.467499] print_req_error: I/O error, dev loop1, sector 201 [ 350.476249] print_req_error: I/O error, dev loop1, sector 105 [ 350.480897] Buffer I/O error on dev loop1p4, logical block 0, async page read [ 350.486788] Buffer I/O error on dev loop1p2, logical block 1, async page read [ 350.507642] print_req_error: I/O error, dev loop1, sector 301 [ 350.513688] Buffer I/O error on dev loop1p4, logical block 0, async page read [ 350.521370] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 350.528813] Buffer I/O error on dev loop1p2, logical block 0, async page read [ 350.536153] Buffer I/O error on dev loop1p2, logical block 1, async page read 05:15:13 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x200, @time={0x0, 0x989680}, 0x200, {0xfffffffffffffffc, 0x9}, 0x3ff, 0x0, 0x4}) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) 05:15:14 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000002c0)=0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) io_setup(0x7ff, &(0x7f0000000080)=0x0) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xf, 0x4, r1, &(0x7f00000000c0)="bfee56910168ffe132da023f23cf02d6e1589ff376f43dfda65172500cf66a588c651407a6ffd74096fd92a443d24eac93b06c3bf9c396c8639be6cac406fc78efba4d3c503c9ab0ff74124362d827fb24be24d0d581f8070e9dffe2143fa1170844b458de2c17c73fc2b9a0fedbc59e558bc15c95cf1b284570486dd32bcb88c6cefd0981e88681805a107e97fc1bfbd54fa4f5426272a01900cabd26f8dfee976b1756f4d2e25b954dd88e6f5bed16abf2b8805c45beb6c57ef0fd3bc8a982ec28ea880025f8", 0xc7, 0x1000, 0x0, 0x2, r1}, &(0x7f0000000200)) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 05:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x7e) dup2(r0, r2) r3 = dup3(r2, r1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x240050}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x5c, r4, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 05:15:14 executing program 2: syz_read_part_table(0x6b6b6b00000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:14 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) bind$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}]}) 05:15:14 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xcb00, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:14 executing program 2: syz_read_part_table(0x2000000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = dup2(r0, r3) dup3(r3, r2, 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) 05:15:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}]}) 05:15:14 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x200004, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x39f, 0x418000) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)=0x3441) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000080)=0x2, 0x4) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x1f, 0x400800) 05:15:15 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x9, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) 05:15:15 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES32=0x0], 0x108) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}]}) 05:15:15 executing program 0: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) read(r0, &(0x7f0000000000)=""/6, 0x6) dup2(0xffffffffffffffff, r0) dup3(r0, 0xffffffffffffffff, 0x0) 05:15:15 executing program 2: syz_read_part_table(0xf0ffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000100)={0x3, 0x1, @start={0x1}}) 05:15:15 executing program 3: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x6, 0xc, 0x4, 0x2200000, {}, {0x5, 0x0, 0x9, 0x3d, 0x8, 0x7fff, "09b7dfc4"}, 0x7, 0x0, @fd=0xffffffffffffff9c, 0x4}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) [ 352.443561] loop1: p1 p3 p4 [ 352.459540] EXT4-fs: 8 callbacks suppressed [ 352.459555] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 05:15:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xae00, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x200) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000040)={0x8, "24f6236e00fd80080a1505179b7f3ed816442c11f4a542cc5b1dbceecaf3eefc", 0x3, 0x1}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x3, 0x4000000010000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r3, 0x0) 05:15:15 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES16], @ANYRES64], 0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:15 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000000)={0x0, @reserved}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0xc0001000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r1, 0x11, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x4}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40080) openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f00000003c0)={0x5, 0x2, 0x9, 0x5229, 0x6}) r5 = syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x1) sendmmsg(r3, &(0x7f00000002c0), 0x4000000000002c7, 0x200000000000a00) socket$inet6_udp(0xa, 0x2, 0x0) msgget(0x3, 0x0) accept(r3, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000080)=0x80) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000380)=0x5) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000100)={'team0\x00', r6}) socket$inet6(0xa, 0x3, 0x0) getpgrp(0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x6) getpgrp(0x0) poll(&(0x7f0000000040)=[{r5, 0x4004}, {r4, 0x1011}, {r2, 0x2}, {r2, 0x200}], 0x4, 0x800) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200)=0x40, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000011000000962a8623e6fc67aeff0100000000000000000000000000010000000000000000"], 0x28}}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r5, &(0x7f0000000440)="77c86842de3973cefe68db7d52c88c1d98bfc47a353ed45e09285f84411ff12525f9a3f3b508a9392f30c44034c29f29efcf08417ade2472c6664f6a1e3cc7dab734781c5e8dd282357cef2bf634049ddf41d92ac3ab6e52d23209d20d51e5179528b4d02fc9bd4b001234e73b9bdd933b09d54ea53ca2984e27ed2264897ff3e092f4cacc196e9a1ccc9e30bacb5a9bc99e717e29c7cd20e718faa35c0a5f35df4e768f44d547c4d1a4aebc9c9b454e5ced87522e8e7b6964f9eb54f341486e22eeb42234c154e3fe9b13289ca6563cb17ebd4050096099fbe91006a58e8ca85ea5a39ecb23d5116dc9be", &(0x7f0000000540)=""/122}, 0x18) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000180)=""/191) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') 05:15:15 executing program 2: syz_read_part_table(0x8cffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 352.730712] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 05:15:16 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x800, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) dup2(r0, r3) 05:15:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}]}) 05:15:16 executing program 2: syz_read_part_table(0x3000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 353.169935] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value [ 353.182027] loop1: p1 p3 p4 05:15:16 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) getsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x4) 05:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80100, 0x86) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000040)={0x0, 0x100000001}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup2(r0, r3) dup3(r3, r1, 0x0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000140)=""/80) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x400000) [ 353.351893] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value 05:15:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xea00, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}]}) 05:15:16 executing program 2: syz_read_part_table(0x4000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x44000, 0x0) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000040)={0x14bf, 0x2, 0x7}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:15:16 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080)=0x80000000, 0x4) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{0x1, 0x0, 0x7, 0x3, 0x4}, 0x8, 0x412e, 'id1\x00', 'timer1\x00', 0x0, 0x6, 0x101, 0x1, 0x10001}) 05:15:17 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f00000004c0)={"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"}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000200)={0x200, 0x10, [0x7fff, 0x7, 0x6, 0xffffffff]}) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x20, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB="2c616e61090066ab6d9d9c60f203d17c32006b0c00006465762f7573626d6f6e23002c706f73697861636c2c616e616d653d6367726f75702c646f6e745f686173682c657569643e", @ANYRESDEC=r2, @ANYBLOB=',smackfsfloor=/dev/usbmon#\x00,fscontext=staff_u,\x00']) [ 353.890854] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value 05:15:17 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x1, 0xef, 0x1, 0x7ff, 0x1000, 0xc2, 0x7f, 0x8, 0x7, 0x8, 0xffffffffffffff00, 0x1}) openat$cgroup_ro(r0, &(0x7f0000000180)='Y\xd4f\x01\x11\x02\x81\xe8ZL\xc5W\x93', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000080)={[0x0, 0x102000, 0x2003, 0x91d915bc8cfa5220], 0x1, 0x41, 0x1}) 05:15:17 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xc082, 0x0) r1 = socket(0x8, 0x6, 0x7717) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xa}) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0x9201, 0x0) 05:15:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 05:15:17 executing program 2: syz_read_part_table(0xfffffdfd, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}]}) [ 354.277361] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 05:15:17 executing program 3: syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) [ 354.447125] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 05:15:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xe200, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}]}) 05:15:17 executing program 2: syz_read_part_table(0xa1ffffff00000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x40000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r3, 0x5, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x19}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 05:15:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)={0xa0392506f1208f5e, r0}) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000080)=0x5) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000000)={0x9, 0x0, 0x7, 0x100000000, 0x3, @stepwise={{0x9, 0x100000001}, {0x2, 0x401}, {0x4000000000000000, 0x3f}}}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f00000001c0)={0x0, {0x7fff, 0x8000}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) [ 354.750274] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 05:15:18 executing program 2: syz_read_part_table(0x5000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 354.865418] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value [ 355.455098] loop1: p1 p3 p4 05:15:18 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(r1, &(0x7f0000002340)=[{&(0x7f0000000100)=""/4096, 0xfffffffffffffe9d}, {&(0x7f0000002240)=""/239, 0xffffffffffffffd1}, {&(0x7f0000002380)=""/4096, 0xffffffffffffff97}], 0x27a, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'bridge0\x00', {0x2, 0x4e24, @rand_addr=0x80}}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) r2 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001100)='/proc/self/attr/current\x00', 0x2, 0x0) sendfile(r0, r2, &(0x7f0000001140), 0x0) 05:15:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x4, 0x0, 0x7000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="06000091ac51fb8e4746007000fddbdf2501000000080001004e22008008ffd3392929d918410002000a000100"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x801) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 05:15:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001280)={0x53, 0xffffffffffffffff, 0x81, 0x9, @buffer={0x0, 0x1000, &(0x7f0000000280)=""/4096}, &(0x7f0000000000)="8b2ac7e29ba56f16638a4da299b387993cda989a85b7c44614b6c74b09cd029b34a0b011dc3a4319c013d566e74ce6e1e93b0e81ef2d8b40568fce2ceefbb752e0bf482f06695ae944df4c312291bd6d5c211016a850d00d8d143b520d9e4fc31dedb421b50016094020c6cbdf2eb6267a321d4b0c39d4f1f26d5075e1a603f470", &(0x7f00000000c0)=""/223, 0x1, 0x10000, 0xffffffffffffffff, &(0x7f00000001c0)}) prctl$PR_SET_TIMERSLACK(0x1d, 0xe03e) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}]}) 05:15:18 executing program 2: syz_read_part_table(0x1000000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x500, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 355.670482] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 05:15:19 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000000)="67ecfad8984244dd95e99019ec6f83fd3487ebb8069acbc8076fb54ac5b7ccc20427e3415d19259c7c59642c7515946691411b027acdc8535e40648173b244ab5b6c42ef57b5949f21f0b34cb68330cc2504c2414dbbe14a87b7ff2103926ee967b5d620fc1560653969e9ed4628b40bdf4ae084c47aba1b1f9d5fd91403bac7ab3f4840e295d8683e4abb7e001a2a2df3a5227743e3e763581f5352da984c8a77099bda683d4f45edac2a1811206fb42fa45bdaa712aafaefbe459109403235888e7e96a811dc753f28b6a70c48bb49a11a6fdbf0ce6c112fe1be6512b7848174c92eee048405"}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}]}) 05:15:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14}}}, 0x7ffff000}}, 0x0) 05:15:19 executing program 2: syz_read_part_table(0x8004000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 356.033638] loop1: p1 p2 p3 p4 < > 05:15:19 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xfa00, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:20 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) 05:15:20 executing program 2: syz_read_part_table(0x2000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:20 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x4, 0xfff, 0x6, 0x9, 0x0, 0x400, 0x0, 0x2, 0x2, 0x4, 0x1, 0x8, 0x1ff, 0x4, 0x1f, 0x1, 0x1, 0x6, 0x81, 0x6d, 0x7, 0x6, 0x3, 0x3, 0x6a6, 0xff, 0xff, 0x2, 0x5, 0x2f, 0x616, 0x7ff, 0x3, 0x1f, 0x1, 0x5, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x13005, 0x2, 0x6be, 0x9, 0x6922, 0x9, 0x6}, 0x0, 0x0, r0, 0xa) 05:15:20 executing program 0: 05:15:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}]}) 05:15:20 executing program 0: 05:15:20 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x3, 0x4, 0x0, 0x5, 0x20890, 0x6, 0x7, 0x8, 0x9669, 0x100000000, 0x7fffffff, 0xfffffffffffff7f6, 0x0, 0x7fff, 0x3, 0x1, 0x20000, 0x5, 0x77d0, 0x8, 0x6, 0x7fffffff, 0x9, 0x2, 0x800, 0x3, 0x2, 0x9, 0xffffffff00000001, 0x7, 0x0, 0x80000001, 0x9, 0x5, 0x0, 0xffffffff, 0x3, @perf_bp={&(0x7f0000000000), 0xe}, 0x2, 0x10001, 0x4, 0x0, 0x40, 0x0, 0x101}, 0xffffffffffffffff, 0x8, r0, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:20 executing program 2: syz_read_part_table(0xff0f, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:20 executing program 0: 05:15:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}]}) 05:15:20 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100, 0x2040) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0xc334, 0x3, 0x4}) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) [ 357.337416] loop1: p1 p3 p4 05:15:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x11c12, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 357.510838] EXT4-fs: 6 callbacks suppressed [ 357.510852] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 05:15:21 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) 05:15:21 executing program 0: 05:15:21 executing program 2: syz_read_part_table(0xfffffffffffff000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:21 executing program 3: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip6gre0\x00', 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x62, 0xc000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0xff, "b621739c256af86288e6321a9a778418ae47b56a3bde04986fd72a74cfff38369cee12758356b9e7ac292dc128f26d0f9b0742962c78d3ecf5962dad2c4336d97c1864d35063c6e4a80a49358d92a5d49c7484eb2e176fd24b35cd394f4ff70d224c55b8eff83c783522832e3834e2db444993c2fae9f162ec46eea247a9afa77b7602206a9ef2b31406e9d59cb3895ff594a48689bcbc1217d6c7afe96ed36e070ecb22b9763bd8325801bb7d832617cd9ae2d04c6be0175f66144ab5480977019d8357ac488fb7ac922c4db610c3a9e6779bdfc76d8f9f212cf3bc669b4687785feee3a5090cb32e322ab837c4683b647324fe0c43f2279ba3b0480a8ab3"}, &(0x7f0000000240)=0x107) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYBLOB="2e00000059f31a9c7a528bf9a34d08b795545533b99c9a5a500000be7552cd5519987eda403dada0a5c96c0bc4ad614aa920"], &(0x7f00000002c0)=0x36) dup2(r0, r1) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x3) ioctl$sock_ifreq(r1, 0x89b7, &(0x7f0000000080)={'team0\x00', @ifru_addrs=@ethernet={0x0, @random="7fa1ad8b9a00"}}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000300)={0x1, [0x3]}, &(0x7f0000000340)=0x6) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0x9201, 0x0) 05:15:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}]}) 05:15:21 executing program 0: 05:15:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) connect$rds(r1, &(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) fsetxattr$security_ima(r2, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="22050000000000000043"], 0x1, 0x0) flock(r0, 0x0) write$selinux_load(r2, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0], @ANYRES16=r2, @ANYRES32=r0], 0x12) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000180)=0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r4 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0x9201, 0x0) [ 358.020145] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 05:15:21 executing program 2: syz_read_part_table(0xfffffff6, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 358.171250] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 05:15:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}]}) [ 358.288191] SELinux: policydb magic number 0x4 does not match expected magic number 0xf97cff8c 05:15:21 executing program 0: [ 358.363744] SELinux: failed to load policy [ 358.471677] SELinux: policydb magic number 0xa does not match expected magic number 0xf97cff8c 05:15:21 executing program 2: syz_read_part_table(0x1400000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x11c34, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 358.526198] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value [ 358.535214] SELinux: failed to load policy [ 358.666856] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 05:15:22 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x8, 0x4}, {0x47b, 0x7}, 0x9, 0x1, 0x5}) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) 05:15:22 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x4800002, 0x4831, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:15:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 05:15:22 executing program 2: syz_read_part_table(0x8cffffff00000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}]}) [ 359.100746] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 05:15:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000280)=""/244) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000140)=""/15) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) close(r0) [ 359.215125] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 05:15:22 executing program 2: syz_read_part_table(0x200000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:22 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffe94}, 0xe3c7) write$FUSE_GETXATTR(r0, &(0x7f0000000180)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) io_setup(0x20000000002, &(0x7f00000002c0)=0x0) shutdown(0xffffffffffffffff, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) sched_setattr(0x0, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x3, r1, 0x0, 0x0, 0xfffffff0}) 05:15:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) 05:15:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}]}) [ 359.496977] loop1: p1 p3 p4 05:15:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x11c09, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:23 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x10800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:23 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:15:23 executing program 2: syz_read_part_table(0x28000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}]}) 05:15:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x7, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) 05:15:24 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x2, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000000)=0x7000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 360.636229] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 05:15:24 executing program 2: syz_read_part_table(0x626000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xc800, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') [ 360.805916] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 05:15:24 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffe94}, 0xe3c7) write$FUSE_GETXATTR(r0, &(0x7f0000000180)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) io_setup(0x20000000002, &(0x7f00000002c0)=0x0) shutdown(0xffffffffffffffff, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) sched_setattr(0x0, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x3, r1, 0x0, 0x0, 0xfffffff0}) 05:15:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}]}) 05:15:24 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000080)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000000)={0x3, 0xa, 0x4, 0x2010003, {0x0, 0x7530}, {0x5, 0x1, 0x5, 0x80, 0xcd, 0x5, '~;-<'}, 0x3, 0x4, @userptr=0x2, 0x4}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 05:15:24 executing program 2: syz_read_part_table(0x700000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:24 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/163) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000280)={0x80, {{0xa, 0x4e20, 0x1000, @ipv4={[], [], @remote}, 0x6}}, 0x1, 0x5, [{{0xa, 0x4e21, 0x1c, @mcast2, 0x8}}, {{0xa, 0x4e23, 0x4d7d, @local, 0xefa2}}, {{0xa, 0x4e20, 0x1, @remote, 0x9cb}}, {{0xa, 0x4e23, 0x1, @mcast1, 0x3}}, {{0xa, 0x4e22, 0x2, @mcast1, 0xfffffffffffffff7}}]}, 0x310) ioctl$RTC_VL_CLR(r0, 0x7014) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x9, 0x4) [ 361.358076] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 05:15:25 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x0, 0x0, 0x10002, 0x80}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000140)={0x400, r1, 0x10000, 0x2}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:15:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)=0x6) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2000000000000000}}]}) 05:15:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0xcc00, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:25 executing program 2: syz_read_part_table(0xf0ffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$getregs(0xe, r1, 0x7ff, &(0x7f0000000040)=""/144) 05:15:25 executing program 0: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:15:25 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x400) mq_timedreceive(r0, &(0x7f00000000c0)=""/209, 0xd1, 0xfffffffffffffffd, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1e) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x9201, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000000)={@dev}, &(0x7f0000000040)=0x14) 05:15:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x820e000000000000}}]}) 05:15:25 executing program 2: syz_read_part_table(0x100000000000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x27, 0x1, 0x1, 0x0, 0x0, 0x4, "194898f4957f4b73d83f008c31f8da458b56211de14291ba65554e58d16ee5d11a1c1de524caa2564f1177b6b16b8b96101d80a46acf27dd0219b0b5b67fc0", 0x21}, 0x60, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x1}, 0xc890) 05:15:26 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x1) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3, 0x4, 0x7, 0x8, 0x6000000000000000, 0xffffffff00000001}, @x25={0x3, 0x7, 0x1f, "4da8e8759d8b45686e67"}}, 0x17) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000200)={0x40, 0x19, 0x1003, "4b1240d529b4d29306f76959e45115151621e8773b6e95b286384487e1fd4b15", 0x7c7f505e}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffffffffffffff9c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$trusted_overlay_upper(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.upper\x00', &(0x7f00000004c0)={0x0, 0xfb, 0xc5, 0x1, 0x7, "75e75c71154d8941e12793e114614d1c", "133c6064a40740a3fc74160d4a05df7908af6f5d7aff21cf97db07a5f0c29866eb67f5383625136b1432f96d078085989819eacbf5af46847210920035a14cd17571b413f2b09e6daf9124526f864268b357447f512fe9bbae3976518797eee90b5d05ebdfb8ca886bf0b06407d7ca019738e99907661d669c6f6f2297ed3a0615efa8f8ee7926f782ed226912018a1c227d9bead07c6dfbab0d80329a7806609e061f8a987d0b70fa1610a19cc6c7c1"}, 0xc5, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x86, 0x2, 0x0, "770e63df3332358be3d4656a0a3913fa", "b13262f233ea11f917848b268c871242029a4cbf47e04b28d52104b1208a387d37002ff90f505849cc583e89946b79d87e086aaacef9eeb5da9836dfc2220e8f426a052af86381330a8951110cbbfb27f4c191271dc271d9806a329d3485a4598837cf6dc73767defc86602e76672e3851"}, 0x86, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x4, 0x7fff, 0x75, 0x2, 0x9}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000380)={0x10, 0x8, &(0x7f00000002c0)="7e85ce4caac9ced6d4c44a32c75da4a93877fe74c8adf74dc82b52b36317b2bf23449a2bd1fc504b6d42605aa81f8509df793af3e7dffa490a70a2db2ff86e89e80c590b2e3c84ad14e1a83257d9c0612e879e9b4ef1b6e1895bca53e7802ed9dfba72230d92ee543a8ba668db1baacb308adc62b51280b62547a87748328bf77b03307a42fee194361928b5061423bb6bb5572a099b52be", {0x7fff, 0x5, 0x767d7f5b, 0x1, 0x400, 0x19, 0x9, 0x7}}) 05:15:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x500000000000000}}]}) 05:15:26 executing program 2: syz_read_part_table(0x10000000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1f3f9, 0x10000) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/71) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x80, 0x6, 0x400, 0x3, 0x5, 0x100000001}}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x3100, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000004c0)=0x0) tkill(r2, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="960f33"]) r4 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x101000) epoll_pwait(r4, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, 0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 05:15:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:26 executing program 2: syz_read_part_table(0xe2010000, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400000000000000}}]}) 05:15:26 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000017c0)=0x2, 0x12) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x11f) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) fsetxattr(r0, &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000180)='((^#,:).posix_acl_accessnodevsecurity\x00', 0x26, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r2, 0xa, 0x36) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x6f, 0x7, 0xaedb, "a0f188cc2df43076853602eedfb2883a", "486c36131a6f0eb31082e2bfe3e75d8d595f54deb9932d5a85308c7b0abb38eb60e1bb5fcd5061ae4ce7c7e364f974909e3918cfb4b808590244285b5b381cd2baaa95182fc8fc349ea8b2d0021cb4fa4f9c582babb8926e6cc0"}, 0x6f, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) 05:15:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x98061cc}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x400, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x7, @bearer=@l2={'ib', 0x3a, 'eql\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x518c9b7ab8906538}, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:27 executing program 2: syz_read_part_table(0x6, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) 05:15:27 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50010100}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@ipv6_delroute={0xe4, 0x19, 0x120, 0x70bd26, 0x25dfdbfd, {0xa, 0x10, 0x80, 0x3d55694a, 0xff, 0x0, 0xff, 0x4, 0x200}, [@RTA_METRICS={0xbc, 0x8, "bdf6546c70461d9e04c388e614cf99fcb8641d347e790eb48ce3e0c1df128ea1a4b0bc49aa010a2cb40074040a387c0f90eee7e18eb1a197bab2357a78435aa2ca71187bc163bf2d875aa5236c852dc29926052f91cc461314c268c22f6ddbdef72b7931afe0a6b2da104871884886849be1ebf82732d3984411e87dd2f806d92b2c999113c436b9b61264db7f19fce1e972729337f924a59044e24cae0a0c0ac407964dfd83b9b9476f0d21a0d3fdc6cb029410ab83"}, @RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x55, @fd=r0}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) 05:15:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3000000}}]}) 05:15:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup(0xffffffffffffff9c) dup2(r0, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x9100, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') 05:15:27 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9201, 0x0) 05:15:27 executing program 2: syz_read_part_table(0x10, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(r0) [ 364.259614] ================================================================== [ 364.267355] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16f/0x240 [ 364.274835] Write of size 50331616 at addr ffff8881abe021a0 by task rs:main Q:Reg/6022 [ 364.282902] [ 364.284545] CPU: 0 PID: 6022 Comm: rs:main Q:Reg Not tainted 4.20.0-rc7+ #161 [ 364.291821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.301174] Call Trace: [ 364.301230] dump_stack+0x244/0x39d [ 364.301251] ? dump_stack_print_info.cold.1+0x20/0x20 [ 364.301264] ? printk+0xa7/0xcf [ 364.301280] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 364.301303] print_address_description.cold.7+0x9/0x1ff [ 364.326090] kasan_report.cold.8+0x242/0x309 [ 364.330509] ? __ext4_expand_extra_isize+0x16f/0x240 [ 364.330533] check_memory_region+0x13e/0x1b0 [ 364.330551] memset+0x23/0x40 [ 364.330570] __ext4_expand_extra_isize+0x16f/0x240 [ 364.330589] ext4_mark_inode_dirty+0x8f9/0xb20 [ 364.352706] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 364.357666] ? __might_sleep+0x95/0x190 [ 364.361685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.367233] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 364.372952] ? __lock_is_held+0xb5/0x140 [ 364.377022] ? ext4_setattr+0x28f0/0x28f0 [ 364.381186] ext4_dirty_inode+0x97/0xc0 [ 364.385167] __mark_inode_dirty+0x7c3/0x1510 [ 364.389581] ? __inode_attach_wb+0x13f0/0x13f0 [ 364.394171] ? mark_buffer_dirty+0x1c6/0x8d0 [ 364.398581] ? __lock_is_held+0xb5/0x140 [ 364.402644] ? buffer_io_error+0xa0/0xa0 [ 364.406720] ? wait_for_stable_page+0x1a5/0x570 [ 364.411398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 364.416939] ? unlock_page+0x2c2/0x4c0 [ 364.420846] ? wake_up_page_bit+0x6f0/0x6f0 [ 364.425185] ? __might_sleep+0x95/0x190 [ 364.429164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.434706] ? __block_commit_write.isra.37+0x301/0x3f0 [ 364.440077] __generic_write_end+0x320/0x400 [ 364.444506] ? remove_inode_buffers+0x3f0/0x3f0 [ 364.449178] ? block_write_end+0xab/0x230 [ 364.453334] ? page_zero_new_buffers+0x8f0/0x8f0 [ 364.458097] ? __lock_is_held+0xb5/0x140 [ 364.462171] generic_write_end+0x6c/0x90 [ 364.466239] ext4_da_write_end+0x2e0/0xcd0 [ 364.470477] ? kasan_check_write+0x14/0x20 [ 364.474725] ? ext4_write_end+0x10c0/0x10c0 [ 364.479052] ? iov_iter_zero+0x1360/0x1360 [ 364.483287] ? __sanitizer_cov_trace_const_cmp1+0x4/0x20 [ 364.488759] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 364.493949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.499488] ? timespec64_trunc+0xea/0x180 [ 364.503728] ? inode_init_owner+0x340/0x340 [ 364.508055] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 364.513158] ? ext4_write_end+0x10c0/0x10c0 [ 364.517483] generic_perform_write+0x4ca/0x6a0 [ 364.522086] ? add_page_wait_queue+0x400/0x400 [ 364.526684] ? current_time+0x1b0/0x1b0 [ 364.530672] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.535691] ? generic_write_checks+0x266/0x3d0 [ 364.540367] ? generic_write_check_limits+0x370/0x370 [ 364.545558] ? ext4_file_write_iter+0x2a1/0x1420 [ 364.550334] __generic_file_write_iter+0x26e/0x630 [ 364.555282] ext4_file_write_iter+0x390/0x1420 [ 364.559875] ? ext4_file_mmap+0x410/0x410 [ 364.564042] ? ksys_dup3+0x680/0x680 [ 364.567764] ? zap_class+0x640/0x640 [ 364.571478] ? __lock_is_held+0xb5/0x140 [ 364.575556] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 364.580512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.586051] ? iov_iter_init+0xe5/0x210 [ 364.590029] __vfs_write+0x6b8/0x9f0 [ 364.593750] ? kernel_read+0x120/0x120 [ 364.597645] ? __lock_is_held+0xb5/0x140 [ 364.601732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.607270] ? __sb_start_write+0x1b2/0x370 [ 364.611601] vfs_write+0x1fc/0x560 [ 364.615151] ksys_write+0x101/0x260 [ 364.618785] ? __ia32_sys_read+0xb0/0xb0 [ 364.622853] ? trace_hardirqs_off_caller+0x310/0x310 [ 364.627960] __x64_sys_write+0x73/0xb0 [ 364.631858] do_syscall_64+0x1b9/0x820 [ 364.635745] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 364.641114] ? syscall_return_slowpath+0x5e0/0x5e0 [ 364.646040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.650900] ? trace_hardirqs_on_caller+0x310/0x310 [ 364.655929] ? prepare_exit_to_usermode+0x291/0x3b0 [ 364.660953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.665804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.671009] RIP: 0033:0x7f65dc2b519d [ 364.674721] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 364.693614] RSP: 002b:00007f65da856000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 364.701317] RAX: ffffffffffffffda RBX: 00000000000000f5 RCX: 00007f65dc2b519d [ 364.708579] RDX: 00000000000000f5 RSI: 0000000000d27a90 RDI: 0000000000000005 [ 364.715844] RBP: 0000000000d27a90 R08: 0000000000d27b75 R09: 00007f65dbc323f7 [ 364.723123] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 364.730392] R13: 00007f65da856480 R14: 0000000000000002 R15: 0000000000d27890 [ 364.737684] [ 364.739306] The buggy address belongs to the page: [ 364.744235] page:ffffea0006af8080 count:2 mapcount:0 mapping:ffff8881cc4d0658 index:0x427 [ 364.752544] flags: 0x2fffc000000203a(referenced|dirty|lru|active|private) [ 364.759694] raw: 02fffc000000203a ffffea0006b05c08 ffffea0006c7c348 ffff8881cc4d0658 [ 364.767577] raw: 0000000000000427 ffff8881affa1690 00000002ffffffff ffff8881d9a4adc0 [ 364.775462] page dumped because: kasan: bad access detected [ 364.781162] page->mem_cgroup:ffff8881d9a4adc0 [ 364.785648] [ 364.787274] Memory state around the buggy address: [ 364.792204] ffff8881abe8ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.799564] ffff8881abe8ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.806922] >ffff8881abe90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 364.814269] ^ [ 364.817631] ffff8881abe90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 364.824996] ffff8881abe90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 364.832350] ================================================================== [ 364.839715] Disabling lock debugging due to kernel taint [ 364.SeaBIOS (version 1.8.2-20181112_143635-google) Total RAM Size = 0x00000001e0000000 = 7680 MiB CPUs found: 2 Max CPUs supported: 2 found virtio-scsi at 0:3 virtio-scsi vendor='Google' product='PersistentDisk' rev='1' type=0 removable=0 virtio-scsi blksize=512 sectors=4194304 = 2048 MiB drive 0x000f2a70: PCHS=0/0/0 translation=lba LCHS=520/128/63 s=4194304 Booting from Hard Disk 0... early console in extract_kernel input_data: 0x00000000089c42e9 input_len: 0x000000000343f2f1 output: 0x0000000001000000 output_len: 0x000000000990fa48 kernel_total_size: 0x000000000ae26000 trampoline_32bit: 0x000000000009d000 Decompressing Linux... Parsing ELF... done. Booting the kernel. [ 0.000000] Linux version 4.20.0-rc7+ (syzkaller@ci) (gcc version 8.0.1 20180413 (experimental) (GCC)) #161 SMP PREEMPT Fri Dec 21 01:32:57 UTC 2018 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 security=selinux ima_policy=tcb workqueue.watchdog_thresh=140 kvm-intel.nested=1 nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000 nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000 nf-conntrack-sane.ports=20000 vivid.n_devs=16 vivid.multiplanar=1,2,1,2,1,2,1,2,1,2,1,2,1,2,1,2 spec_store_bypass_disable=prctl nopcid [ 0.000000] KERNEL supported cpus: [ 0.000000] Intel GenuineIntel [ 0.000000] AMD AuthenticAMD [ 0.000000] Centaur CentaurHauls [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfffcfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfffd000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffbc000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable [ 0.000000] printk: bootconsole [earlyser0] enabled [ 0.000000] Malformed early option 'vsyscall' [ 0.000000] nopcid: PCID feature disabled [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000004] kvm-clock: cpu 0, msr a53a001, primary cpu clock [ 0.000004] kvm-clock: using sched offset of 3569020203 cycles [ 0.000800] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.003089] tsc: Detected 2300.000 MHz processor [ 0.006658] last_pfn = 0x220000 max_arch_pfn = 0x400000000 [ 0.007586] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.008651] last_pfn = 0xbfffd max_arch_pfn = 0x400000000 [ 0.013354] found SMP MP-table at [mem 0x000f2ce0-0x000f2cef] mapped at [(____ptrval____)] [ 0.014753] check: Scanning 1 areas for low memory corruption [ 0.015680] Using GB pages for direct mapping [ 0.018326] ACPI: Early table checksum verification disabled [ 0.019336] ACPI: RSDP 0x00000000000F2AB0 000014 (v00 Google) [ 0.020164] ACPI: RSDT 0x00000000BFFFDBA0 000038 (v01 Google GOOGRSDT 00000001 GOOG 00000001) [ 0.021396] ACPI: FACP 0x00000000BFFFFF00 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) [ 0.022565] ACPI: DSDT 0x00000000BFFFDBE0 0017B2 (v01 Google GOOGDSDT 00000001 GOOG 00000001) [ 0.023796] ACPI: FACS 0x00000000BFFFFEC0 000040 [ 0.024494] ACPI: FACS 0x00000000BFFFFEC0 000040 [ 0.025150] ACPI: SSDT 0x00000000BFFFF590 000930 (v01 Google GOOGSSDT 00000001 GOOG 00000001) [ 0.026476] ACPI: APIC 0x00000000BFFFF4A0 000076 (v01 Google GOOGAPIC 00000001 GOOG 00000001) [ 0.027729] ACPI: WAET 0x00000000BFFFF470 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) [ 0.028980] ACPI: SRAT 0x00000000BFFFF3A0 0000C8 (v01 Google GOOGSRAT 00000001 GOOG 00000001) [ 0.030495] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.031133] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.031728] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] [ 0.032676] ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] [ 0.033492] ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] [ 0.034409] NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] [ 0.035795] NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] [ 0.037191] NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffdfff] [ 0.087482] Zone ranges: [ 0.087936] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.088949] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.089844] Normal [mem 0x0000000100000000-0x000000021fffffff] [ 0.090823] Movable zone start for each node [ 0.091488] Early memory node ranges [ 0.092124] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.093116] node 0: [mem 0x0000000000100000-0x00000000bfffcfff] [ 0.093967] node 0: [mem 0x0000000100000000-0x000000021fffffff] [ 0.094820] Zeroed struct page in unavailable ranges: 101 pages [ 0.094827] Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] [ 0.618989] kasan: KernelAddressSanitizer initialized [ 0.620242] ACPI: PM-Timer IO Port: 0xb008 [ 0.620852] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.621754] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.622980] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.623851] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.624787] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.625919] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.627199] Using ACPI (MADT) for SMP configuration information [ 0.628080] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.628809] PM: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.629674] PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.630671] PM: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.631565] PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.632559] PM: Registered nosave memory: [mem 0xbfffd000-0xbfffffff] [ 0.633477] PM: Registered nosave memory: [mem 0xc0000000-0xfffbbfff] [ 0.634467] PM: Registered nosave memory: [mem 0xfffbc000-0xffffffff] [ 0.635361] [mem 0xc0000000-0xfffbbfff] available for PCI devices [ 0.636171] Booting paravirtualized kernel on KVM [ 0.636849] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 0.638338] random: get_random_bytes called from start_kernel+0x153/0xa30 with crng_init=0 [ 0.639459] setup_percpu: NR_CPUS:64 nr_cpumask_bits:64 nr_cpu_ids:2 nr_node_ids:1 [ 0.641569] percpu: Embedded 56 pages/cpu @(____ptrval____) s189256 r8192 d31928 u1048576 [ 0.642880] Built 1 zonelists, mobility grouping on. Total pages: 1935238 [ 0.643941] Policy zone: Normal [ 0.644372] Kernel command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 security=selinux ima_policy=tcb workqueue.watchdog_thresh=140 kvm-intel.nested=1 nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000 nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000 nf-conntrack-sane.ports=20000 vivid.n_devs=16 vivid.multiplanar=1,2,1,2,1,2,1,2,1,2,1,2,1,2,1,2 spec_store_bypass_disable=prctl nopcid [ 1.389261] Memory: 6489316K/7863916K available (114712K kernel code, 13832K rwdata, 17556K rodata, 3116K init, 25540K bss, 1374600K reserved, 0K cma-reserved) [ 1.394224] Running RCU self tests [ 1.394724] rcu: Preemptible hierarchical RCU implementation. [ 1.395642] rcu: RCU lockdep checking is enabled. [ 1.396289] rcu: RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=2. [ 1.397254] rcu: RCU callback double-/use-after-free debug enabled. [ 1.398123] Tasks RCU enabled. [ 1.398566] rcu: RCU calculated value of scheduler-enlistment delay is 10 jiffies. [ 1.399611] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 1.407436] NR_IRQS: 4352, nr_irqs: 440, preallocated irqs: 16 [ 1.410137] Console: colour VGA+ 80x25 [ 1.410743] printk: console [ttyS0] enabled [ 1.410743] printk: console [ttyS0] enabled [ 1.412143] printk: bootconsole [earlyser0] disabled [ 1.412143] printk: bootconsole [earlyser0] disabled [ 1.413678] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 1.414763] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 1.415427] ... MAX_LOCK_DEPTH: 48 [ 1.416057] ... MAX_LOCKDEP_KEYS: 8191 [ 1.416682] ... CLASSHASH_SIZE: 4096 [ 1.417446] ... MAX_LOCKDEP_ENTRIES: 32768 [ 1.418268] ... MAX_LOCKDEP_CHAINS: 65536 [ 1.418927] ... CHAINHASH_SIZE: 32768 [ 1.419588] memory used by lock dependency info: 7263 kB [ 1.420383] per task-struct memory footprint: 1920 bytes [ 1.423459] ACPI: Core revision 20181003 [ 1.424658] APIC: Switch to symmetric I/O mode setup [ 1.425956] x2apic enabled [ 1.427458] Switched APIC routing to physical x2apic. [ 1.431455] ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 [ 1.432450] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 1.434049] Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS (lpj=23000000) [ 1.444041] pid_max: default: 32768 minimum: 301 [ 1.445141] LSM: Security Framework initializing [ 1.445816] Yama: becoming mindful. [ 1.446375] SELinux: Initializing. [ 1.447242] AppArmor: AppArmor disabled by boot time parameter [ 1.453091] Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) [ 1.456505] Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) [ 1.457723] Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 1.459509] Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 1.462665] mce: CPU supports 32 MCE banks [ 1.464237] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 1.465189] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 1.466250] Spectre V2 : Mitigation: Full generic retpoline [ 1.467164] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 1.468364] Speculative Store Bypass: Vulnerable [ 1.469853] Freeing SMP alternatives memory: 72K [ 1.474017] smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) [ 1.524097] Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. [ 1.544041] rcu: Hierarchical SRCU implementation. [ 1.564293] NMI watchdog: Perf NMI watchdog permanently disabled [ 1.594040] smp: Bringing up secondary CPUs ... [ 1.675161] x86: Booting SMP configuration: [ 1.675891] .... node #0, CPUs: #1 [ 0.035297] kvm-clock: cpu 1, msr a53a041, secondary cpu clock [ 1.678840] smp: Brought up 1 node, 2 CPUs [ 1.678840] smpboot: Max logical packages: 1 [ 1.678840] smpboot: Total of 2 processors activated (9200.00 BogoMIPS) [ 1.684661] devtmpfs: initialized [ 1.695908] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 1.695908] futex hash table entries: 512 (order: 4, 65536 bytes) [ 1.696620] xor: automatically using best checksumming function avx [ 1.696620] RTC time: 5:15:34, date: 12/21/18 [ 1.704121] NET: Registered protocol family 16 [ 1.704121] audit: initializing netlink subsys (disabled) [ 1.705485] kworker/u4:0 (25) used greatest stack depth: 23936 bytes left [ 1.707086] audit: type=2000 audit(1545369333.960:1): state=initialized audit_enabled=0 res=1 [ 1.709077] kworker/u4:2 (29) used greatest stack depth: 23112 bytes left [ 1.716641] cpuidle: using governor menu [ 1.717536] ACPI: bus type PCI registered [ 1.724140] dca service started, version 1.12.1 [ 1.725057] PCI: Using configuration type 1 for base access [ 1.882934] kworker/u4:3 (427) used greatest stack depth: 21120 bytes left [ 1.939958] kworker/u4:0 (579) used greatest stack depth: 20920 bytes left [ 2.099746] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 2.099746] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 2.104599] cryptd: max_cpu_qlen set to 1000 [ 2.284085] raid6: sse2x1 gen() 1816 MB/s [ 2.454048] raid6: sse2x1 xor() 1106 MB/s [ 2.624055] raid6: sse2x2 gen() 3576 MB/s [ 2.794044] raid6: sse2x2 xor() 1867 MB/s [ 2.964079] raid6: sse2x4 gen() 5543 MB/s [ 3.129309] raid6: sse2x4 xor() 3137 MB/s [ 3.299308] raid6: avx2x1 gen() 3575 MB/s [ 3.469287] raid6: avx2x1 xor() 2038 MB/s [ 3.644048] raid6: avx2x2 gen() 6789 MB/s [ 3.809291] raid6: avx2x2 xor() 3800 MB/s [ 3.979288] raid6: avx2x4 gen() 10918 MB/s [ 4.149284] raid6: avx2x4 xor() 6437 MB/s [ 4.149960] raid6: using algorithm avx2x4 gen() 10918 MB/s [ 4.150757] raid6: .... xor() 6437 MB/s, rmw enabled [ 4.151459] raid6: using avx2x2 recovery algorithm [ 4.154753] ACPI: Added _OSI(Module Device) [ 4.154753] ACPI: Added _OSI(Processor Device) [ 4.154753] ACPI: Added _OSI(3.0 _SCP Extensions) [ 4.154753] ACPI: Added _OSI(Processor Aggregator Device) [ 4.155519] ACPI: Added _OSI(Linux-Dell-Video) [ 4.156313] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 4.201294] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 4.219993] ACPI: Interpreter enabled [ 4.220883] ACPI: (supports S0 S3 S4 S5) [ 4.221509] ACPI: Using IOAPIC for interrupt routing [ 4.224040] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 4.225924] ACPI: Enabled 16 GPEs in block 00 to 0F [ 4.305655] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 4.306659] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] [ 4.307935] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 4.314364] PCI host bridge to bus 0000:00 [ 4.314468] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 4.315152] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 4.316265] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 4.317335] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] [ 4.318765] pci_bus 0000:00: root bus resource [bus 00-ff] [ 4.352412] pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI [ 4.406879] ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) [ 4.410595] ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) [ 4.413577] ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) [ 4.416256] ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) [ 4.418423] ACPI: PCI Interrupt Link [LNKS] (IRQs *9) [ 4.428430] vgaarb: loaded [ 4.434644] SCSI subsystem initialized [ 4.436072] ACPI: bus type USB registered [ 4.436353] usbcore: registered new interface driver usbfs [ 4.437457] usbcore: registered new interface driver hub [ 4.438546] usbcore: registered new device driver usb [ 4.448072] media: Linux media interface: v0.10 [ 4.449187] videodev: Linux video capture interface: v2.00 [ 4.449187] pps_core: LinuxPPS API ver. 1 registered [ 4.449187] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 4.449187] PTP clock support registered [ 4.455279] EDAC MC: Ver: 3.0.0 [ 4.455869] Advanced Linux Sound Architecture Driver Initialized. [ 4.464842] PCI: Using ACPI for IRQ routing [ 4.468676] Bluetooth: Core ver 2.22 [ 4.469652] NET: Registered protocol family 31 [ 4.470494] Bluetooth: HCI device and connection manager initialized [ 4.471433] Bluetooth: HCI socket layer initialized [ 4.472148] Bluetooth: L2CAP socket layer initialized [ 4.473020] Bluetooth: SCO socket layer initialized [ 4.473874] NET: Registered protocol family 8 [ 4.474833] NET: Registered protocol family 20 [ 4.475727] NetLabel: Initializing [ 4.476420] NetLabel: domain hash size = 128 [ 4.476420] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 4.476420] NetLabel: unlabeled traffic allowed by default [ 4.476509] nfc: nfc_init: NFC Core ver 0.1 [ 4.477394] NET: Registered protocol family 39 [ 4.485799] clocksource: Switched to clocksource kvm-clock [ 4.994879] VFS: Disk quotas dquot_6.6.0 [ 4.995851] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 4.997464] FS-Cache: Loaded [ 4.998873] CacheFiles: Loaded [ 4.999884] pnp: PnP ACPI init [ 5.011698] pnp: PnP ACPI: found 7 devices [ 5.065380] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 5.067561] NET: Registered protocol family 2 [ 5.069993] tcp_listen_portaddr_hash hash table entries: 4096 (order: 6, 294912 bytes) [ 5.071570] TCP established hash table entries: 65536 (order: 7, 524288 bytes) [ 5.076006] TCP bind hash table entries: 65536 (order: 10, 4194304 bytes) [ 5.080656] TCP: Hash tables configured (established 65536 bind 65536) [ 5.082726] UDP hash table entries: 4096 (order: 7, 655360 bytes) [ 5.085216] UDP-Lite hash table entries: 4096 (order: 7, 655360 bytes) [ 5.087131] NET: Registered protocol family 1 [ 5.089202] RPC: Registered named UNIX socket transport module. [ 5.090217] RPC: Registered udp transport module. [ 5.090937] RPC: Registered tcp transport module. [ 5.091721] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 5.103987] NET: Registered protocol family 44 [ 5.104775] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 5.107179] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 5.108084] software IO TLB: mapped [mem 0xbbffd000-0xbfffd000] (64MB) [ 5.110505] RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 10737418240 ms ovfl timer [ 5.111753] RAPL PMU: hw unit of domain pp0-core 2^-0 Joules [ 5.112595] RAPL PMU: hw unit of domain package 2^-0 Joules [ 5.113430] RAPL PMU: hw unit of domain dram 2^-16 Joules [ 5.114583] VPID CAP should not exist if not support 1-setting enable VPID VM-execution control [ 5.117635] kvm: already loaded the other module [ 5.118389] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 5.120141] Machine check injector initialized [ 5.124759] check: Scanning for low memory corruption every 60 seconds [ 5.230049] Initialise system trusted keyrings [ 5.231426] workingset: timestamp_bits=40 max_order=21 bucket_order=0 [ 5.233058] zbud: loaded [ 5.238941] DLM installed [ 5.240937] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 5.242837] FS-Cache: Netfs 'nfs' registered for caching [ 5.244746] NFS: Registering the id_resolver key type [ 5.245534] Key type id_resolver registered [ 5.246224] Key type id_legacy registered [ 5.246852] nfs4filelayout_init: NFSv4 File Layout Driver Registering... [ 5.247970] Installing knfsd (copyright (C) 1996 okir@monad.swb.de). [ 5.249985] ntfs: driver 2.1.32 [Flags: R/W]. [ 5.251147] fuse init (API version 7.28) [ 5.253750] JFS: nTxBlock = 8192, nTxLock = 65536 [ 5.263400] SGI XFS with ACLs, security attributes, realtime, no debug enabled [ 5.267344] 9p: Installing v9fs 9p2000 file system support [ 5.268199] FS-Cache: Netfs '9p' registered for caching [ 5.271369] gfs2: GFS2 installed [ 5.274013] FS-Cache: Netfs 'ceph' registered for caching [ 5.275219] ceph: loaded (mds proto 32)