e0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:48 executing program 1: setuid(0xee01) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:29:48 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) openat$incfs(r0, &(0x7f00000001c0)='.log\x00', 0x418102, 0x0) 14:29:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) openat$incfs(r0, &(0x7f00000001c0)='.log\x00', 0x418102, 0x0) 14:29:49 executing program 1: setuid(0xee01) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:29:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x418102, 0x0) 14:29:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1112.336923] Bluetooth: hci3 command 0x0401 tx timeout 14:29:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1112.423170] Bluetooth: hci0 command 0x0401 tx timeout 14:29:49 executing program 4: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x418102, 0x0) 14:29:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 4: openat$incfs(0xffffffffffffffff, 0x0, 0x418102, 0x0) 14:29:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 14:29:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 4: openat$incfs(0xffffffffffffffff, 0x0, 0x418102, 0x0) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 14:29:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 4: openat$incfs(0xffffffffffffffff, 0x0, 0x418102, 0x0) 14:29:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 14:29:50 executing program 3: setuid(0xee01) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:50 executing program 4: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x0, 0x0) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: setuid(0xee01) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:50 executing program 4: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x0, 0x0) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: setuid(0xee01) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 4: openat$incfs(0xffffffffffffffff, &(0x7f00000001c0)='.log\x00', 0x0, 0x0) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1114.416881] Bluetooth: hci3 command 0x0401 tx timeout 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1114.496740] Bluetooth: hci0 command 0x0401 tx timeout 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 14:29:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1116.496825] Bluetooth: hci3 command 0x0401 tx timeout 14:29:53 executing program 0: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1116.576754] Bluetooth: hci0 command 0x0401 tx timeout 14:29:53 executing program 0: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:54 executing program 2: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: setuid(0xee01) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1118.576762] Bluetooth: hci3 command 0x0401 tx timeout 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1118.656877] Bluetooth: hci0 command 0x0401 tx timeout 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:55 executing program 3: syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setuid(0xee01) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = add_key$user(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f00000003c0)={0xc, {0x2, "abf6"}}, 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x42000, 0x0) write$FUSE_ATTR(r2, 0x0, 0x0) connect$packet(r2, &(0x7f0000000000)={0x11, 0x1c, 0x0, 0x1, 0x7f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) add_key$fscrypt_provisioning(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)={0x2, 0x0, @auto=[0x30, 0x1d, 0x18, 0x2c, 0x15, 0x3b]}, 0xe, 0xfffffffffffffffa) r3 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="00ece69410916509e9355953f901ecc2a298855094b6cea74b632717eb36a254c24e9f8f2b7aa83b71ecfd6fb660d92a70b252bb05380e2101e71340f582f0a130f6d1d9718d95a7b73f7253fb6e20e07e709e396e11cc5e2dc3293aaccbfb1d7a", 0x61, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000180)={r0, r3, r0}, &(0x7f00000001c0)=""/131, 0x83, &(0x7f0000000340)={&(0x7f0000000280)={'sha512-avx\x00'}, &(0x7f00000002c0)="3faf7ebf0412aec294054003c10d787ed8fac1ac385fd2bdc3378804ecd2099fbfdc73097911ec074bda24d721bcbccfb81a4fab8817e86a2c61e534331a8955f2994a4a6feca0acddede11f21708845ad2b65117bf7b3170b7a123c70dfb811e3e0e6ddf2c70a48f71893a05b051b8e4ec0c06c331eb3c3e3cca7", 0x7b}) bind$packet(r2, &(0x7f0000000380)={0x11, 0x17, 0x0, 0x1, 0x27, 0x6, @broadcast}, 0x14) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000300)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffffc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000340)={@desc={0x1, 0x0, @auto="901193484708210f"}, 0x10, r1, '\x00', @d}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.pending_reads\x00', 0x4604c0, 0x8) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x7ff, 0x80, 0x5, 0x101}, {0x200, 0x1f, 0x1f, 0x267}, {0x0, 0x1, 0x1, 0x401}, {0x5, 0x0, 0x43, 0x6}, {0x245b, 0x1f, 0xf7, 0x375}, {0xfffd, 0x4, 0x0, 0x6}, {0xea4, 0x1f, 0x81, 0x5}, {0x1000, 0x81, 0x1, 0x3}]}, 0xffffffffffffff70) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000300)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffffc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000340)={@desc={0x1, 0x0, @auto="901193484708210f"}, 0x10, r1, '\x00', @d}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.pending_reads\x00', 0x4604c0, 0x8) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x7ff, 0x80, 0x5, 0x101}, {0x200, 0x1f, 0x1f, 0x267}, {0x0, 0x1, 0x1, 0x401}, {0x5, 0x0, 0x43, 0x6}, {0x245b, 0x1f, 0xf7, 0x375}, {0xfffd, 0x4, 0x0, 0x6}, {0xea4, 0x1f, 0x81, 0x5}, {0x1000, 0x81, 0x1, 0x3}]}, 0xffffffffffffff70) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000300)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffffc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000340)={@desc={0x1, 0x0, @auto="901193484708210f"}, 0x10, r1, '\x00', @d}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.pending_reads\x00', 0x4604c0, 0x8) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x7ff, 0x80, 0x5, 0x101}, {0x200, 0x1f, 0x1f, 0x267}, {0x0, 0x1, 0x1, 0x401}, {0x5, 0x0, 0x43, 0x6}, {0x245b, 0x1f, 0xf7, 0x375}, {0xfffd, 0x4, 0x0, 0x6}, {0xea4, 0x1f, 0x81, 0x5}, {0x1000, 0x81, 0x1, 0x3}]}, 0xffffffffffffff70) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000300)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffffc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000340)={@desc={0x1, 0x0, @auto="901193484708210f"}, 0x10, r1, '\x00', @d}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.pending_reads\x00', 0x4604c0, 0x8) write$UHID_INPUT(r2, &(0x7f00000014c0)={0x8, {"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", 0x1000}}, 0x1006) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x7ff, 0x80, 0x5, 0x101}, {0x200, 0x1f, 0x1f, 0x267}, {0x0, 0x1, 0x1, 0x401}, {0x5, 0x0, 0x43, 0x6}, {0x245b, 0x1f, 0xf7, 0x375}, {0xfffd, 0x4, 0x0, 0x6}, {0xea4, 0x1f, 0x81, 0x5}, {0x1000, 0x81, 0x1, 0x3}]}, 0xffffffffffffff70) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x4000, 0x1a7) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r3) 14:29:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.210428] FAULT_INJECTION: forcing a failure. [ 1120.210428] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.232896] CPU: 0 PID: 6323 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1120.240751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.250105] Call Trace: [ 1120.252687] dump_stack+0x1b2/0x281 [ 1120.256302] should_fail.cold+0x10a/0x149 [ 1120.260442] should_failslab+0xd6/0x130 [ 1120.264426] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1120.269106] loop_add+0x83/0x830 [ 1120.272475] ? loop_queue_rq+0x280/0x280 [ 1120.276526] ? loop_queue_work+0x1e80/0x1e80 [ 1120.281013] ? trace_hardirqs_on+0x10/0x10 [ 1120.285242] loop_control_ioctl+0x11a/0x3f0 [ 1120.289672] ? loop_lookup+0x190/0x190 [ 1120.293567] ? SyS_write+0x1b7/0x210 [ 1120.297281] ? loop_lookup+0x190/0x190 [ 1120.301164] do_vfs_ioctl+0x75a/0xff0 [ 1120.304964] ? ioctl_preallocate+0x1a0/0x1a0 [ 1120.309381] ? lock_downgrade+0x740/0x740 [ 1120.313545] ? __fget+0x225/0x360 [ 1120.316994] ? do_vfs_ioctl+0xff0/0xff0 [ 1120.320956] ? security_file_ioctl+0x83/0xb0 [ 1120.325355] SyS_ioctl+0x7f/0xb0 [ 1120.328705] ? do_vfs_ioctl+0xff0/0xff0 [ 1120.332687] do_syscall_64+0x1d5/0x640 [ 1120.336575] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1120.341793] RIP: 0033:0x4665f9 [ 1120.344969] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1120.352701] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 14:29:57 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.359962] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1120.367675] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.374953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.382212] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:29:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.452232] FAULT_INJECTION: forcing a failure. [ 1120.452232] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.468663] CPU: 0 PID: 6336 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1120.476531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.485919] Call Trace: [ 1120.488537] dump_stack+0x1b2/0x281 [ 1120.492180] should_fail.cold+0x10a/0x149 [ 1120.496403] should_failslab+0xd6/0x130 14:29:57 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.500405] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1120.506048] __kmalloc_node+0x38/0x70 [ 1120.509945] blk_mq_alloc_tag_set+0x27c/0x910 [ 1120.514551] loop_add+0x2a0/0x830 [ 1120.518000] ? loop_queue_rq+0x280/0x280 [ 1120.522075] ? loop_queue_work+0x1e80/0x1e80 [ 1120.526633] ? trace_hardirqs_on+0x10/0x10 [ 1120.530880] loop_control_ioctl+0x11a/0x3f0 [ 1120.535582] ? loop_lookup+0x190/0x190 [ 1120.539617] ? SyS_write+0x1b7/0x210 [ 1120.543342] ? loop_lookup+0x190/0x190 [ 1120.547222] do_vfs_ioctl+0x75a/0xff0 [ 1120.551051] ? ioctl_preallocate+0x1a0/0x1a0 [ 1120.555473] ? lock_downgrade+0x740/0x740 [ 1120.559632] ? __fget+0x225/0x360 [ 1120.563101] ? do_vfs_ioctl+0xff0/0xff0 [ 1120.567462] ? security_file_ioctl+0x83/0xb0 [ 1120.572254] SyS_ioctl+0x7f/0xb0 [ 1120.575721] ? do_vfs_ioctl+0xff0/0xff0 [ 1120.579892] do_syscall_64+0x1d5/0x640 [ 1120.583802] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1120.589173] RIP: 0033:0x4665f9 [ 1120.592361] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1120.600143] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1120.607505] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1120.614954] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.622240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.629503] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:29:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 4 (fault-call:1 fault-nth:2): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:29:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.666689] Bluetooth: hci3 command 0x0401 tx timeout 14:29:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.725736] FAULT_INJECTION: forcing a failure. [ 1120.725736] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.739009] Bluetooth: hci0 command 0x0401 tx timeout [ 1120.762382] CPU: 0 PID: 6352 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 14:29:57 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1120.770225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.779666] Call Trace: [ 1120.782255] dump_stack+0x1b2/0x281 [ 1120.785884] should_fail.cold+0x10a/0x149 [ 1120.791259] should_failslab+0xd6/0x130 [ 1120.795233] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1120.800472] __kmalloc_node+0x38/0x70 [ 1120.804267] blk_mq_alloc_tag_set+0x30f/0x910 [ 1120.808781] loop_add+0x2a0/0x830 [ 1120.812242] ? loop_queue_rq+0x280/0x280 [ 1120.816392] ? loop_queue_work+0x1e80/0x1e80 [ 1120.820794] ? trace_hardirqs_on+0x10/0x10 [ 1120.825019] loop_control_ioctl+0x11a/0x3f0 [ 1120.829342] ? loop_lookup+0x190/0x190 [ 1120.833543] ? SyS_write+0x1b7/0x210 [ 1120.837262] ? loop_lookup+0x190/0x190 [ 1120.841167] do_vfs_ioctl+0x75a/0xff0 [ 1120.845024] ? ioctl_preallocate+0x1a0/0x1a0 [ 1120.849787] ? lock_downgrade+0x740/0x740 [ 1120.854076] ? __fget+0x225/0x360 [ 1120.857576] ? do_vfs_ioctl+0xff0/0xff0 [ 1120.861686] ? security_file_ioctl+0x83/0xb0 [ 1120.866101] SyS_ioctl+0x7f/0xb0 [ 1120.869730] ? do_vfs_ioctl+0xff0/0xff0 [ 1120.873711] do_syscall_64+0x1d5/0x640 [ 1120.877590] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1120.882766] RIP: 0033:0x4665f9 [ 1120.885936] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1120.893637] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1120.900909] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1120.908261] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.915542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:29:57 executing program 4 (fault-call:1 fault-nth:3): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1120.922814] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:29:57 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, 0x0, &(0x7f0000000400)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1121.023074] FAULT_INJECTION: forcing a failure. [ 1121.023074] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.044342] CPU: 1 PID: 6372 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1121.052198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.061690] Call Trace: [ 1121.064270] dump_stack+0x1b2/0x281 [ 1121.067898] should_fail.cold+0x10a/0x149 [ 1121.072054] should_failslab+0xd6/0x130 [ 1121.076034] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1121.081128] blk_mq_init_tags+0x5e/0x280 [ 1121.085174] blk_mq_alloc_rq_map+0x90/0x220 [ 1121.089480] __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1121.093967] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1121.098467] loop_add+0x2a0/0x830 [ 1121.101907] ? loop_queue_rq+0x280/0x280 [ 1121.105953] ? loop_queue_work+0x1e80/0x1e80 [ 1121.110348] ? trace_hardirqs_on+0x10/0x10 [ 1121.114569] loop_control_ioctl+0x11a/0x3f0 [ 1121.118898] ? loop_lookup+0x190/0x190 [ 1121.122779] ? SyS_write+0x1b7/0x210 [ 1121.126487] ? loop_lookup+0x190/0x190 [ 1121.130365] do_vfs_ioctl+0x75a/0xff0 [ 1121.134165] ? ioctl_preallocate+0x1a0/0x1a0 [ 1121.138566] ? lock_downgrade+0x740/0x740 [ 1121.142705] ? __fget+0x225/0x360 [ 1121.146281] ? do_vfs_ioctl+0xff0/0xff0 [ 1121.150243] ? security_file_ioctl+0x83/0xb0 [ 1121.154883] SyS_ioctl+0x7f/0xb0 [ 1121.158238] ? do_vfs_ioctl+0xff0/0xff0 [ 1121.162210] do_syscall_64+0x1d5/0x640 [ 1121.166087] entry_SYSCALL_64_after_hwframe+0x46/0xbb 14:29:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1121.171269] RIP: 0033:0x4665f9 [ 1121.174441] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1121.182136] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1121.189851] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1121.197387] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.204664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.211921] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:29:58 executing program 4 (fault-call:1 fault-nth:4): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1121.230159] blk-mq: reduced tag depth (128 -> 64) 14:29:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, 0x0, &(0x7f0000000400)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1121.349667] FAULT_INJECTION: forcing a failure. [ 1121.349667] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.372950] CPU: 0 PID: 6393 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1121.380787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.390148] Call Trace: [ 1121.392724] dump_stack+0x1b2/0x281 [ 1121.396337] should_fail.cold+0x10a/0x149 [ 1121.400469] should_failslab+0xd6/0x130 [ 1121.404434] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1121.409541] __kmalloc_node+0x38/0x70 [ 1121.413336] sbitmap_init_node+0x10c/0x3d0 [ 1121.417573] sbitmap_queue_init_node+0x37/0x5d0 [ 1121.422248] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1121.427267] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1121.432536] blk_mq_init_tags+0xf4/0x280 [ 1121.436610] blk_mq_alloc_rq_map+0x90/0x220 [ 1121.440961] __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1121.445450] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1121.449951] loop_add+0x2a0/0x830 [ 1121.453454] ? loop_queue_rq+0x280/0x280 [ 1121.457651] ? loop_queue_work+0x1e80/0x1e80 [ 1121.462093] ? trace_hardirqs_on+0x10/0x10 [ 1121.466331] loop_control_ioctl+0x11a/0x3f0 [ 1121.470654] ? loop_lookup+0x190/0x190 [ 1121.474531] ? SyS_write+0x1b7/0x210 [ 1121.478242] ? loop_lookup+0x190/0x190 [ 1121.482115] do_vfs_ioctl+0x75a/0xff0 [ 1121.486339] ? ioctl_preallocate+0x1a0/0x1a0 [ 1121.490734] ? lock_downgrade+0x740/0x740 [ 1121.494879] ? __fget+0x225/0x360 [ 1121.498329] ? do_vfs_ioctl+0xff0/0xff0 [ 1121.502308] ? security_file_ioctl+0x83/0xb0 [ 1121.506724] SyS_ioctl+0x7f/0xb0 [ 1121.510738] ? do_vfs_ioctl+0xff0/0xff0 [ 1121.514714] do_syscall_64+0x1d5/0x640 [ 1121.518604] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1121.523893] RIP: 0033:0x4665f9 [ 1121.527078] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1121.534786] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1121.542043] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 14:29:58 executing program 4 (fault-call:1 fault-nth:5): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1121.549304] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.556612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.564009] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1121.573433] blk-mq: reduced tag depth (128 -> 64) 14:29:58 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, 0x0, &(0x7f0000000400)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1121.684580] FAULT_INJECTION: forcing a failure. [ 1121.684580] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.711529] CPU: 0 PID: 6413 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1121.719427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.728806] Call Trace: [ 1121.731397] dump_stack+0x1b2/0x281 [ 1121.735113] should_fail.cold+0x10a/0x149 [ 1121.739268] should_failslab+0xd6/0x130 [ 1121.744066] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1121.749340] sbitmap_queue_init_node+0x27f/0x5d0 [ 1121.756236] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1121.761842] blk_mq_init_tags+0xf4/0x280 [ 1121.766020] blk_mq_alloc_rq_map+0x90/0x220 [ 1121.770348] __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1121.775280] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1121.780182] loop_add+0x2a0/0x830 [ 1121.783777] ? loop_queue_rq+0x280/0x280 [ 1121.788108] ? loop_queue_work+0x1e80/0x1e80 [ 1121.792609] ? trace_hardirqs_on+0x10/0x10 [ 1121.796882] loop_control_ioctl+0x11a/0x3f0 [ 1121.801280] ? loop_lookup+0x190/0x190 [ 1121.805169] ? SyS_write+0x1b7/0x210 [ 1121.808886] ? loop_lookup+0x190/0x190 [ 1121.812763] do_vfs_ioctl+0x75a/0xff0 [ 1121.816576] ? ioctl_preallocate+0x1a0/0x1a0 [ 1121.820974] ? lock_downgrade+0x740/0x740 [ 1121.825323] ? __fget+0x225/0x360 [ 1121.828787] ? do_vfs_ioctl+0xff0/0xff0 [ 1121.832887] ? security_file_ioctl+0x83/0xb0 [ 1121.837298] SyS_ioctl+0x7f/0xb0 [ 1121.840677] ? do_vfs_ioctl+0xff0/0xff0 [ 1121.844655] do_syscall_64+0x1d5/0x640 [ 1121.848574] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1121.853763] RIP: 0033:0x4665f9 [ 1121.856990] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1121.864711] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1121.871977] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 14:29:58 executing program 4 (fault-call:1 fault-nth:6): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1121.879243] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.886523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.893814] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1121.902590] blk-mq: reduced tag depth (128 -> 64) 14:29:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:58 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1122.030824] FAULT_INJECTION: forcing a failure. [ 1122.030824] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.049814] CPU: 0 PID: 6441 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1122.057720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.067085] Call Trace: [ 1122.069803] dump_stack+0x1b2/0x281 [ 1122.073538] should_fail.cold+0x10a/0x149 [ 1122.077710] should_failslab+0xd6/0x130 [ 1122.081702] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1122.086854] sbitmap_queue_init_node+0x27f/0x5d0 [ 1122.091699] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1122.097009] blk_mq_init_tags+0x14b/0x280 [ 1122.101350] blk_mq_alloc_rq_map+0x90/0x220 [ 1122.105688] __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1122.110296] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1122.114834] loop_add+0x2a0/0x830 [ 1122.118336] ? loop_queue_rq+0x280/0x280 [ 1122.122508] ? loop_queue_work+0x1e80/0x1e80 [ 1122.126932] ? trace_hardirqs_on+0x10/0x10 [ 1122.131196] loop_control_ioctl+0x11a/0x3f0 [ 1122.135529] ? loop_lookup+0x190/0x190 [ 1122.139408] ? SyS_write+0x1b7/0x210 [ 1122.143129] ? loop_lookup+0x190/0x190 [ 1122.147016] do_vfs_ioctl+0x75a/0xff0 [ 1122.150817] ? ioctl_preallocate+0x1a0/0x1a0 [ 1122.155214] ? lock_downgrade+0x740/0x740 [ 1122.159352] ? __fget+0x225/0x360 [ 1122.162795] ? do_vfs_ioctl+0xff0/0xff0 [ 1122.166768] ? security_file_ioctl+0x83/0xb0 [ 1122.171178] SyS_ioctl+0x7f/0xb0 [ 1122.174557] ? do_vfs_ioctl+0xff0/0xff0 [ 1122.178533] do_syscall_64+0x1d5/0x640 [ 1122.182422] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1122.187639] RIP: 0033:0x4665f9 [ 1122.190822] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1122.198534] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1122.205821] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1122.213083] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1122.220343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:29:59 executing program 4 (fault-call:1 fault-nth:7): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1122.227629] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1122.236788] blk-mq: reduced tag depth (128 -> 64) 14:29:59 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x0, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1122.327924] FAULT_INJECTION: forcing a failure. [ 1122.327924] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.358964] CPU: 1 PID: 6460 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1122.366817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:29:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1122.376331] Call Trace: [ 1122.378914] dump_stack+0x1b2/0x281 [ 1122.382557] should_fail.cold+0x10a/0x149 [ 1122.386711] should_failslab+0xd6/0x130 [ 1122.390672] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1122.395770] __kmalloc_node+0x38/0x70 [ 1122.399575] blk_mq_alloc_rq_map+0xd2/0x220 [ 1122.403898] __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1122.408379] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1122.412877] loop_add+0x2a0/0x830 [ 1122.416311] ? loop_queue_rq+0x280/0x280 [ 1122.420352] ? loop_queue_work+0x1e80/0x1e80 [ 1122.424749] ? trace_hardirqs_on+0x10/0x10 [ 1122.428973] loop_control_ioctl+0x11a/0x3f0 [ 1122.433289] ? loop_lookup+0x190/0x190 [ 1122.437174] ? SyS_write+0x1b7/0x210 [ 1122.440891] ? loop_lookup+0x190/0x190 [ 1122.444766] do_vfs_ioctl+0x75a/0xff0 [ 1122.448572] ? ioctl_preallocate+0x1a0/0x1a0 [ 1122.452972] ? lock_downgrade+0x740/0x740 [ 1122.457115] ? __fget+0x225/0x360 [ 1122.460582] ? do_vfs_ioctl+0xff0/0xff0 [ 1122.464557] ? security_file_ioctl+0x83/0xb0 [ 1122.468970] SyS_ioctl+0x7f/0xb0 [ 1122.472322] ? do_vfs_ioctl+0xff0/0xff0 [ 1122.476289] do_syscall_64+0x1d5/0x640 [ 1122.480169] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1122.485378] RIP: 0033:0x4665f9 [ 1122.488560] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1122.496255] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1122.503510] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1122.510784] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1122.518041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:29:59 executing program 4 (fault-call:1 fault-nth:8): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1122.525298] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1122.542363] blk-mq: reduced tag depth (128 -> 64) 14:29:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:29:59 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x0, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1122.685363] FAULT_INJECTION: forcing a failure. [ 1122.685363] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.712151] CPU: 0 PID: 6491 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1122.720011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.729369] Call Trace: [ 1122.731968] dump_stack+0x1b2/0x281 [ 1122.735594] should_fail.cold+0x10a/0x149 [ 1122.736712] Bluetooth: hci3 command 0x0401 tx timeout [ 1122.739747] should_failslab+0xd6/0x130 [ 1122.748925] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1122.754035] __kmalloc_node+0x38/0x70 [ 1122.757853] blk_mq_alloc_rq_map+0x113/0x220 [ 1122.762257] __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1122.766757] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1122.771256] loop_add+0x2a0/0x830 [ 1122.774704] ? loop_queue_rq+0x280/0x280 [ 1122.778753] ? loop_queue_work+0x1e80/0x1e80 [ 1122.783155] ? trace_hardirqs_on+0x10/0x10 [ 1122.787385] loop_control_ioctl+0x11a/0x3f0 [ 1122.791703] ? loop_lookup+0x190/0x190 [ 1122.795601] ? SyS_write+0x1b7/0x210 [ 1122.799336] ? loop_lookup+0x190/0x190 [ 1122.803242] do_vfs_ioctl+0x75a/0xff0 [ 1122.807049] ? ioctl_preallocate+0x1a0/0x1a0 [ 1122.812411] ? lock_downgrade+0x740/0x740 [ 1122.816583] ? __fget+0x225/0x360 [ 1122.819347] Bluetooth: hci0 command 0x0401 tx timeout [ 1122.820030] ? do_vfs_ioctl+0xff0/0xff0 [ 1122.829225] ? security_file_ioctl+0x83/0xb0 [ 1122.833651] SyS_ioctl+0x7f/0xb0 [ 1122.837107] ? do_vfs_ioctl+0xff0/0xff0 [ 1122.841113] do_syscall_64+0x1d5/0x640 [ 1122.845003] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1122.850292] RIP: 0033:0x4665f9 [ 1122.853475] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1122.861177] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1122.868611] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1122.875873] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:29:59 executing program 4 (fault-call:1 fault-nth:9): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1122.883296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.890573] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1122.898859] blk-mq: reduced tag depth (128 -> 64) 14:29:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:29:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1123.012692] FAULT_INJECTION: forcing a failure. [ 1123.012692] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1123.055137] CPU: 0 PID: 6511 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1123.062977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.072450] Call Trace: [ 1123.075081] dump_stack+0x1b2/0x281 [ 1123.078858] should_fail.cold+0x10a/0x149 [ 1123.083023] __alloc_pages_nodemask+0x22c/0x2720 [ 1123.087776] ? kasan_kmalloc+0xeb/0x160 [ 1123.091764] ? blk_mq_alloc_rq_map+0x113/0x220 [ 1123.096341] ? __blk_mq_alloc_rq_map+0xa3/0x3a0 [ 1123.101012] ? loop_add+0x2a0/0x830 [ 1123.104630] ? loop_control_ioctl+0x11a/0x3f0 [ 1123.109139] ? do_vfs_ioctl+0x75a/0xff0 [ 1123.113115] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1123.118483] ? __mutex_unlock_slowpath+0x75/0x770 [ 1123.123343] ? fs_reclaim_release+0xd0/0x110 [ 1123.127751] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1123.132601] ? __lockdep_init_map+0x100/0x560 [ 1123.137110] ? _find_next_bit+0xdb/0x100 [ 1123.141174] ? __cpu_to_node+0x7b/0xa0 [ 1123.145054] ? blk_mq_hw_queue_to_node+0x9f/0xf0 [ 1123.149819] blk_mq_alloc_rqs+0x227/0x6d0 [ 1123.153986] ? blk_mq_alloc_rq_map+0x9d/0x220 [ 1123.158493] __blk_mq_alloc_rq_map+0x15b/0x3a0 [ 1123.163082] blk_mq_alloc_tag_set+0x4ac/0x910 [ 1123.167577] loop_add+0x2a0/0x830 [ 1123.171040] ? loop_queue_rq+0x280/0x280 [ 1123.175116] ? loop_queue_work+0x1e80/0x1e80 [ 1123.179544] ? trace_hardirqs_on+0x10/0x10 [ 1123.183790] loop_control_ioctl+0x11a/0x3f0 [ 1123.188113] ? loop_lookup+0x190/0x190 [ 1123.192013] ? SyS_write+0x1b7/0x210 [ 1123.195741] ? loop_lookup+0x190/0x190 [ 1123.199620] do_vfs_ioctl+0x75a/0xff0 [ 1123.203422] ? ioctl_preallocate+0x1a0/0x1a0 [ 1123.207819] ? lock_downgrade+0x740/0x740 [ 1123.211976] ? __fget+0x225/0x360 [ 1123.215425] ? do_vfs_ioctl+0xff0/0xff0 [ 1123.219390] ? security_file_ioctl+0x83/0xb0 [ 1123.223789] SyS_ioctl+0x7f/0xb0 [ 1123.227173] ? do_vfs_ioctl+0xff0/0xff0 [ 1123.231176] do_syscall_64+0x1d5/0x640 [ 1123.235103] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1123.240285] RIP: 0033:0x4665f9 [ 1123.243469] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:30:00 executing program 4 (fault-call:1 fault-nth:10): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1123.251184] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1123.258558] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1123.265857] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1123.273162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1123.280437] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1123.385140] FAULT_INJECTION: forcing a failure. [ 1123.385140] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.424155] CPU: 1 PID: 6529 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1123.432015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.441525] Call Trace: [ 1123.444126] dump_stack+0x1b2/0x281 [ 1123.447757] should_fail.cold+0x10a/0x149 [ 1123.452042] should_failslab+0xd6/0x130 [ 1123.456062] kmem_cache_alloc_node+0x263/0x410 [ 1123.460737] blk_alloc_queue_node+0x2d/0xb40 [ 1123.465165] blk_mq_init_queue+0x42/0x90 [ 1123.469229] loop_add+0x303/0x830 [ 1123.472777] ? loop_queue_rq+0x280/0x280 [ 1123.476966] ? loop_queue_work+0x1e80/0x1e80 [ 1123.481585] ? trace_hardirqs_on+0x10/0x10 [ 1123.485875] loop_control_ioctl+0x11a/0x3f0 [ 1123.490201] ? loop_lookup+0x190/0x190 [ 1123.494079] ? SyS_write+0x1b7/0x210 [ 1123.497782] ? loop_lookup+0x190/0x190 [ 1123.501659] do_vfs_ioctl+0x75a/0xff0 [ 1123.505548] ? ioctl_preallocate+0x1a0/0x1a0 [ 1123.510470] ? lock_downgrade+0x740/0x740 [ 1123.515965] ? __fget+0x225/0x360 [ 1123.519471] ? do_vfs_ioctl+0xff0/0xff0 [ 1123.523605] ? security_file_ioctl+0x83/0xb0 [ 1123.528400] SyS_ioctl+0x7f/0xb0 [ 1123.531865] ? do_vfs_ioctl+0xff0/0xff0 [ 1123.535849] do_syscall_64+0x1d5/0x640 [ 1123.539752] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1123.544939] RIP: 0033:0x4665f9 [ 1123.548126] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1123.555847] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1123.563222] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1123.570486] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1123.577748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1123.585025] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 4 (fault-call:1 fault-nth:11): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) 14:30:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1123.724790] FAULT_INJECTION: forcing a failure. [ 1123.724790] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.751299] CPU: 1 PID: 6557 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1123.759258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.768623] Call Trace: [ 1123.771283] dump_stack+0x1b2/0x281 [ 1123.775270] should_fail.cold+0x10a/0x149 [ 1123.779453] should_failslab+0xd6/0x130 [ 1123.783642] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1123.788422] bioset_create+0x53/0x750 [ 1123.792293] ? kmem_cache_alloc_node+0x38b/0x410 [ 1123.797063] blk_alloc_queue_node+0xa8/0xb40 [ 1123.801497] blk_mq_init_queue+0x42/0x90 [ 1123.805612] loop_add+0x303/0x830 [ 1123.809068] ? loop_queue_rq+0x280/0x280 [ 1123.813120] ? loop_queue_work+0x1e80/0x1e80 [ 1123.817527] ? trace_hardirqs_on+0x10/0x10 [ 1123.821761] loop_control_ioctl+0x11a/0x3f0 [ 1123.826078] ? loop_lookup+0x190/0x190 [ 1123.830055] ? SyS_write+0x1b7/0x210 [ 1123.833771] ? loop_lookup+0x190/0x190 [ 1123.837652] do_vfs_ioctl+0x75a/0xff0 [ 1123.841455] ? ioctl_preallocate+0x1a0/0x1a0 [ 1123.845858] ? lock_downgrade+0x740/0x740 [ 1123.850004] ? __fget+0x225/0x360 [ 1123.853620] ? do_vfs_ioctl+0xff0/0xff0 [ 1123.857737] ? security_file_ioctl+0x83/0xb0 [ 1123.862168] SyS_ioctl+0x7f/0xb0 [ 1123.865662] ? do_vfs_ioctl+0xff0/0xff0 [ 1123.870278] do_syscall_64+0x1d5/0x640 [ 1123.874394] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1123.879733] RIP: 0033:0x4665f9 [ 1123.882983] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1123.891525] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1123.898809] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1123.906253] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1123.913835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1123.921162] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:00 executing program 4 (fault-call:1 fault-nth:12): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) 14:30:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1124.026800] FAULT_INJECTION: forcing a failure. [ 1124.026800] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.059945] CPU: 0 PID: 6577 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1124.067800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.077214] Call Trace: [ 1124.079824] dump_stack+0x1b2/0x281 [ 1124.083446] should_fail.cold+0x10a/0x149 [ 1124.087591] should_failslab+0xd6/0x130 [ 1124.091569] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1124.096845] ? mempool_free+0x1d0/0x1d0 [ 1124.100960] mempool_create_node+0x76/0x3e0 [ 1124.105286] ? mempool_kmalloc+0x20/0x20 [ 1124.111457] bioset_create+0x31b/0x750 [ 1124.115349] ? kmem_cache_alloc_node+0x38b/0x410 [ 1124.120122] blk_alloc_queue_node+0xa8/0xb40 [ 1124.124538] blk_mq_init_queue+0x42/0x90 [ 1124.128623] loop_add+0x303/0x830 [ 1124.132093] ? loop_queue_rq+0x280/0x280 [ 1124.136158] ? loop_queue_work+0x1e80/0x1e80 [ 1124.140579] ? trace_hardirqs_on+0x10/0x10 [ 1124.144830] loop_control_ioctl+0x11a/0x3f0 [ 1124.149159] ? loop_lookup+0x190/0x190 [ 1124.153040] ? SyS_write+0x1b7/0x210 [ 1124.156755] ? loop_lookup+0x190/0x190 [ 1124.160650] do_vfs_ioctl+0x75a/0xff0 [ 1124.166393] ? ioctl_preallocate+0x1a0/0x1a0 [ 1124.170811] ? lock_downgrade+0x740/0x740 [ 1124.174966] ? __fget+0x225/0x360 [ 1124.178421] ? do_vfs_ioctl+0xff0/0xff0 [ 1124.182398] ? security_file_ioctl+0x83/0xb0 [ 1124.186810] SyS_ioctl+0x7f/0xb0 [ 1124.190368] ? do_vfs_ioctl+0xff0/0xff0 [ 1124.194446] do_syscall_64+0x1d5/0x640 [ 1124.198330] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1124.203629] RIP: 0033:0x4665f9 [ 1124.206807] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1124.214511] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 14:30:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) [ 1124.221773] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1124.229040] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.236370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1124.243637] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:01 executing program 4 (fault-call:1 fault-nth:13): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1124.364633] FAULT_INJECTION: forcing a failure. [ 1124.364633] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.396115] CPU: 0 PID: 6597 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1124.403975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.413496] Call Trace: [ 1124.416186] dump_stack+0x1b2/0x281 [ 1124.419823] should_fail.cold+0x10a/0x149 [ 1124.424000] should_failslab+0xd6/0x130 [ 1124.427994] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1124.433245] ? mempool_free+0x1d0/0x1d0 [ 1124.437340] __kmalloc_node+0x38/0x70 [ 1124.441299] mempool_create_node+0xb1/0x3e0 [ 1124.445761] ? mempool_kmalloc+0x20/0x20 [ 1124.450091] bioset_create+0x31b/0x750 [ 1124.454005] ? kmem_cache_alloc_node+0x38b/0x410 [ 1124.458787] blk_alloc_queue_node+0xa8/0xb40 [ 1124.463212] blk_mq_init_queue+0x42/0x90 [ 1124.467423] loop_add+0x303/0x830 [ 1124.470900] ? loop_queue_rq+0x280/0x280 [ 1124.474969] ? loop_queue_work+0x1e80/0x1e80 [ 1124.480868] ? trace_hardirqs_on+0x10/0x10 [ 1124.485227] loop_control_ioctl+0x11a/0x3f0 [ 1124.489545] ? loop_lookup+0x190/0x190 [ 1124.493429] ? SyS_write+0x1b7/0x210 [ 1124.497149] ? loop_lookup+0x190/0x190 [ 1124.501048] do_vfs_ioctl+0x75a/0xff0 [ 1124.504866] ? ioctl_preallocate+0x1a0/0x1a0 [ 1124.509272] ? lock_downgrade+0x740/0x740 [ 1124.513525] ? __fget+0x225/0x360 [ 1124.516989] ? do_vfs_ioctl+0xff0/0xff0 [ 1124.520997] ? security_file_ioctl+0x83/0xb0 [ 1124.525417] SyS_ioctl+0x7f/0xb0 [ 1124.528802] ? do_vfs_ioctl+0xff0/0xff0 [ 1124.532772] do_syscall_64+0x1d5/0x640 [ 1124.536699] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1124.541887] RIP: 0033:0x4665f9 [ 1124.545067] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1124.552957] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1124.560238] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1124.567794] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.575208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1124.582558] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 4 (fault-call:1 fault-nth:14): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1124.736298] FAULT_INJECTION: forcing a failure. [ 1124.736298] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.754805] CPU: 1 PID: 6626 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1124.762661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.772030] Call Trace: [ 1124.774641] dump_stack+0x1b2/0x281 [ 1124.778289] should_fail.cold+0x10a/0x149 [ 1124.782449] should_failslab+0xd6/0x130 [ 1124.786716] kmem_cache_alloc+0x28e/0x3c0 [ 1124.790995] ? mempool_free+0x1d0/0x1d0 [ 1124.794977] mempool_create_node+0x2d2/0x3e0 [ 1124.799387] bioset_create+0x31b/0x750 [ 1124.803293] ? kmem_cache_alloc_node+0x38b/0x410 [ 1124.808313] blk_alloc_queue_node+0xa8/0xb40 [ 1124.812735] blk_mq_init_queue+0x42/0x90 [ 1124.816787] loop_add+0x303/0x830 [ 1124.820246] ? loop_queue_rq+0x280/0x280 [ 1124.824424] ? loop_queue_work+0x1e80/0x1e80 [ 1124.829066] ? trace_hardirqs_on+0x10/0x10 [ 1124.833328] loop_control_ioctl+0x11a/0x3f0 [ 1124.837657] ? loop_lookup+0x190/0x190 [ 1124.841545] ? SyS_write+0x1b7/0x210 [ 1124.845255] ? loop_lookup+0x190/0x190 [ 1124.849141] do_vfs_ioctl+0x75a/0xff0 [ 1124.852935] ? ioctl_preallocate+0x1a0/0x1a0 [ 1124.857349] ? lock_downgrade+0x740/0x740 [ 1124.861500] ? __fget+0x225/0x360 [ 1124.864994] ? do_vfs_ioctl+0xff0/0xff0 [ 1124.868973] ? security_file_ioctl+0x83/0xb0 [ 1124.876859] SyS_ioctl+0x7f/0xb0 [ 1124.880223] ? do_vfs_ioctl+0xff0/0xff0 [ 1124.884212] do_syscall_64+0x1d5/0x640 [ 1124.888112] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1124.893295] RIP: 0033:0x4665f9 [ 1124.896483] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1124.904194] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1124.911633] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1124.919058] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.926339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1124.933726] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1124.944340] Bluetooth: hci3 command 0x0401 tx timeout [ 1124.949769] Bluetooth: hci0 command 0x0401 tx timeout 14:30:02 executing program 4 (fault-call:1 fault-nth:15): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1125.101806] FAULT_INJECTION: forcing a failure. [ 1125.101806] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.120903] CPU: 0 PID: 6653 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1125.128873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.138230] Call Trace: [ 1125.140834] dump_stack+0x1b2/0x281 [ 1125.144499] should_fail.cold+0x10a/0x149 [ 1125.148653] should_failslab+0xd6/0x130 [ 1125.152628] kmem_cache_alloc+0x28e/0x3c0 [ 1125.156783] ? mempool_free+0x1d0/0x1d0 [ 1125.160782] mempool_create_node+0x2d2/0x3e0 [ 1125.165209] bioset_create+0x31b/0x750 [ 1125.169098] ? kmem_cache_alloc_node+0x38b/0x410 [ 1125.173862] blk_alloc_queue_node+0xa8/0xb40 [ 1125.178279] blk_mq_init_queue+0x42/0x90 [ 1125.182342] loop_add+0x303/0x830 [ 1125.185790] ? loop_queue_rq+0x280/0x280 [ 1125.189868] ? loop_queue_work+0x1e80/0x1e80 [ 1125.194278] ? trace_hardirqs_on+0x10/0x10 [ 1125.198522] loop_control_ioctl+0x11a/0x3f0 [ 1125.202864] ? loop_lookup+0x190/0x190 [ 1125.206760] ? SyS_write+0x1b7/0x210 [ 1125.210487] ? loop_lookup+0x190/0x190 [ 1125.214382] do_vfs_ioctl+0x75a/0xff0 [ 1125.218193] ? ioctl_preallocate+0x1a0/0x1a0 [ 1125.222624] ? lock_downgrade+0x740/0x740 [ 1125.226805] ? __fget+0x225/0x360 [ 1125.230399] ? do_vfs_ioctl+0xff0/0xff0 [ 1125.234379] ? security_file_ioctl+0x83/0xb0 [ 1125.238797] SyS_ioctl+0x7f/0xb0 [ 1125.242222] ? do_vfs_ioctl+0xff0/0xff0 [ 1125.246233] do_syscall_64+0x1d5/0x640 [ 1125.250134] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1125.255418] RIP: 0033:0x4665f9 [ 1125.258620] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1125.266333] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1125.273617] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1125.280902] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1125.288217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1125.295494] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 4 (fault-call:1 fault-nth:16): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1125.419039] FAULT_INJECTION: forcing a failure. [ 1125.419039] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.436184] CPU: 0 PID: 6674 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1125.444026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.453549] Call Trace: [ 1125.456148] dump_stack+0x1b2/0x281 [ 1125.459889] should_fail.cold+0x10a/0x149 [ 1125.464159] should_failslab+0xd6/0x130 [ 1125.468145] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1125.473316] ? mempool_free+0x1d0/0x1d0 [ 1125.477313] mempool_create_node+0x76/0x3e0 [ 1125.481635] ? mempool_kmalloc+0x20/0x20 [ 1125.485696] bioset_create+0x506/0x750 [ 1125.489632] ? kmem_cache_alloc_node+0x38b/0x410 [ 1125.494522] blk_alloc_queue_node+0xa8/0xb40 [ 1125.498947] blk_mq_init_queue+0x42/0x90 [ 1125.503010] loop_add+0x303/0x830 [ 1125.506465] ? loop_queue_rq+0x280/0x280 [ 1125.510572] ? loop_queue_work+0x1e80/0x1e80 [ 1125.514982] ? trace_hardirqs_on+0x10/0x10 [ 1125.519228] loop_control_ioctl+0x11a/0x3f0 [ 1125.523554] ? loop_lookup+0x190/0x190 [ 1125.527437] ? SyS_write+0x1b7/0x210 [ 1125.531152] ? loop_lookup+0x190/0x190 [ 1125.535037] do_vfs_ioctl+0x75a/0xff0 [ 1125.538907] ? ioctl_preallocate+0x1a0/0x1a0 [ 1125.543412] ? lock_downgrade+0x740/0x740 [ 1125.547557] ? __fget+0x225/0x360 [ 1125.551012] ? do_vfs_ioctl+0xff0/0xff0 [ 1125.555013] ? security_file_ioctl+0x83/0xb0 [ 1125.559457] SyS_ioctl+0x7f/0xb0 [ 1125.562839] ? do_vfs_ioctl+0xff0/0xff0 [ 1125.566833] do_syscall_64+0x1d5/0x640 [ 1125.570742] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1125.575938] RIP: 0033:0x4665f9 [ 1125.579291] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1125.586997] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1125.594261] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1125.601532] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1125.608801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1125.616088] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 4 (fault-call:1 fault-nth:17): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:02 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1125.769304] FAULT_INJECTION: forcing a failure. [ 1125.769304] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.799307] CPU: 0 PID: 6699 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1125.807217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.816616] Call Trace: [ 1125.819227] dump_stack+0x1b2/0x281 [ 1125.822865] should_fail.cold+0x10a/0x149 [ 1125.827017] should_failslab+0xd6/0x130 [ 1125.830986] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1125.836106] ? mempool_free+0x1d0/0x1d0 [ 1125.840092] __kmalloc_node+0x38/0x70 [ 1125.843901] mempool_create_node+0xb1/0x3e0 [ 1125.848307] ? mempool_kmalloc+0x20/0x20 [ 1125.853112] bioset_create+0x506/0x750 [ 1125.857082] ? kmem_cache_alloc_node+0x38b/0x410 [ 1125.861838] blk_alloc_queue_node+0xa8/0xb40 [ 1125.866320] blk_mq_init_queue+0x42/0x90 [ 1125.870609] loop_add+0x303/0x830 [ 1125.874702] ? loop_queue_rq+0x280/0x280 [ 1125.878772] ? loop_queue_work+0x1e80/0x1e80 [ 1125.883198] ? trace_hardirqs_on+0x10/0x10 [ 1125.887435] loop_control_ioctl+0x11a/0x3f0 [ 1125.891863] ? loop_lookup+0x190/0x190 [ 1125.895759] ? SyS_write+0x1b7/0x210 [ 1125.899624] ? loop_lookup+0x190/0x190 [ 1125.903617] do_vfs_ioctl+0x75a/0xff0 [ 1125.907476] ? ioctl_preallocate+0x1a0/0x1a0 [ 1125.911879] ? lock_downgrade+0x740/0x740 [ 1125.916025] ? __fget+0x225/0x360 [ 1125.919470] ? do_vfs_ioctl+0xff0/0xff0 [ 1125.923610] ? security_file_ioctl+0x83/0xb0 [ 1125.928013] SyS_ioctl+0x7f/0xb0 [ 1125.931443] ? do_vfs_ioctl+0xff0/0xff0 [ 1125.935515] do_syscall_64+0x1d5/0x640 [ 1125.939411] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1125.944607] RIP: 0033:0x4665f9 [ 1125.947934] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1125.955656] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1125.962950] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1125.970303] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1125.977571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1125.984834] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:03 executing program 4 (fault-call:1 fault-nth:18): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1126.080861] FAULT_INJECTION: forcing a failure. [ 1126.080861] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.100944] CPU: 0 PID: 6713 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1126.108885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.118244] Call Trace: [ 1126.120928] dump_stack+0x1b2/0x281 [ 1126.124571] should_fail.cold+0x10a/0x149 [ 1126.128724] should_failslab+0xd6/0x130 [ 1126.132709] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1126.137827] ? mempool_free+0x1d0/0x1d0 [ 1126.141901] mempool_create_node+0x76/0x3e0 [ 1126.146244] ? mempool_kmalloc+0x20/0x20 [ 1126.150313] bioset_create+0x506/0x750 [ 1126.154392] ? kmem_cache_alloc_node+0x38b/0x410 [ 1126.159245] blk_alloc_queue_node+0xa8/0xb40 [ 1126.163754] blk_mq_init_queue+0x42/0x90 [ 1126.167910] loop_add+0x303/0x830 [ 1126.171370] ? loop_queue_rq+0x280/0x280 [ 1126.175445] ? loop_queue_work+0x1e80/0x1e80 [ 1126.179868] ? trace_hardirqs_on+0x10/0x10 [ 1126.184127] loop_control_ioctl+0x11a/0x3f0 [ 1126.188812] ? loop_lookup+0x190/0x190 [ 1126.192728] ? SyS_write+0x1b7/0x210 [ 1126.196451] ? loop_lookup+0x190/0x190 [ 1126.200342] do_vfs_ioctl+0x75a/0xff0 [ 1126.204151] ? ioctl_preallocate+0x1a0/0x1a0 [ 1126.208563] ? lock_downgrade+0x740/0x740 [ 1126.212739] ? __fget+0x225/0x360 [ 1126.216193] ? do_vfs_ioctl+0xff0/0xff0 [ 1126.220172] ? security_file_ioctl+0x83/0xb0 [ 1126.224589] SyS_ioctl+0x7f/0xb0 [ 1126.227974] ? do_vfs_ioctl+0xff0/0xff0 [ 1126.231956] do_syscall_64+0x1d5/0x640 [ 1126.235857] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1126.241068] RIP: 0033:0x4665f9 [ 1126.244265] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1126.252109] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1126.259388] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1126.266667] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1126.273943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 4 (fault-call:1 fault-nth:19): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1126.281310] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1126.389404] FAULT_INJECTION: forcing a failure. [ 1126.389404] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.406886] CPU: 0 PID: 6732 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1126.414843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.424209] Call Trace: [ 1126.426810] dump_stack+0x1b2/0x281 [ 1126.430462] should_fail.cold+0x10a/0x149 [ 1126.434627] should_failslab+0xd6/0x130 [ 1126.438625] kmem_cache_alloc+0x28e/0x3c0 [ 1126.442787] ? mempool_free+0x1d0/0x1d0 [ 1126.446775] mempool_create_node+0x2d2/0x3e0 [ 1126.451198] bioset_create+0x506/0x750 [ 1126.455094] ? kmem_cache_alloc_node+0x38b/0x410 [ 1126.459868] blk_alloc_queue_node+0xa8/0xb40 [ 1126.464294] blk_mq_init_queue+0x42/0x90 [ 1126.468370] loop_add+0x303/0x830 [ 1126.471832] ? loop_queue_rq+0x280/0x280 [ 1126.475895] ? loop_queue_work+0x1e80/0x1e80 [ 1126.480307] ? trace_hardirqs_on+0x10/0x10 [ 1126.484553] loop_control_ioctl+0x11a/0x3f0 14:30:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1126.488888] ? loop_lookup+0x190/0x190 [ 1126.492784] ? SyS_write+0x1b7/0x210 [ 1126.496507] ? loop_lookup+0x190/0x190 [ 1126.500431] do_vfs_ioctl+0x75a/0xff0 [ 1126.504241] ? ioctl_preallocate+0x1a0/0x1a0 [ 1126.508660] ? lock_downgrade+0x740/0x740 [ 1126.512820] ? __fget+0x225/0x360 [ 1126.516276] ? do_vfs_ioctl+0xff0/0xff0 [ 1126.520245] ? security_file_ioctl+0x83/0xb0 [ 1126.524649] SyS_ioctl+0x7f/0xb0 [ 1126.528039] ? do_vfs_ioctl+0xff0/0xff0 [ 1126.532019] do_syscall_64+0x1d5/0x640 14:30:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1126.535903] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1126.541080] RIP: 0033:0x4665f9 [ 1126.544267] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1126.551989] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1126.559253] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1126.566540] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1126.573837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1126.581184] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:03 executing program 4 (fault-call:1 fault-nth:20): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1126.726722] FAULT_INJECTION: forcing a failure. [ 1126.726722] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.747925] CPU: 1 PID: 6752 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1126.755776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.765151] Call Trace: [ 1126.767892] dump_stack+0x1b2/0x281 [ 1126.771515] should_fail.cold+0x10a/0x149 [ 1126.775661] should_failslab+0xd6/0x130 [ 1126.779629] kmem_cache_alloc+0x28e/0x3c0 [ 1126.783769] ? mempool_free+0x1d0/0x1d0 [ 1126.787738] mempool_create_node+0x2d2/0x3e0 [ 1126.792150] bioset_create+0x506/0x750 [ 1126.796075] ? kmem_cache_alloc_node+0x38b/0x410 [ 1126.800839] blk_alloc_queue_node+0xa8/0xb40 [ 1126.805279] blk_mq_init_queue+0x42/0x90 [ 1126.809352] loop_add+0x303/0x830 [ 1126.812822] ? loop_queue_rq+0x280/0x280 [ 1126.816899] ? loop_queue_work+0x1e80/0x1e80 [ 1126.821321] ? trace_hardirqs_on+0x10/0x10 [ 1126.825552] loop_control_ioctl+0x11a/0x3f0 [ 1126.829933] ? loop_lookup+0x190/0x190 [ 1126.833836] ? SyS_write+0x1b7/0x210 [ 1126.837614] ? loop_lookup+0x190/0x190 [ 1126.841511] do_vfs_ioctl+0x75a/0xff0 [ 1126.845307] ? ioctl_preallocate+0x1a0/0x1a0 [ 1126.849706] ? lock_downgrade+0x740/0x740 [ 1126.853845] ? __fget+0x225/0x360 [ 1126.857286] ? do_vfs_ioctl+0xff0/0xff0 [ 1126.861253] ? security_file_ioctl+0x83/0xb0 [ 1126.865677] SyS_ioctl+0x7f/0xb0 [ 1126.869039] ? do_vfs_ioctl+0xff0/0xff0 [ 1126.873019] do_syscall_64+0x1d5/0x640 [ 1126.877003] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1126.882215] RIP: 0033:0x4665f9 [ 1126.885400] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1126.893156] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1126.900430] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1126.907703] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1126.915101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1126.922366] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:03 executing program 4 (fault-call:1 fault-nth:21): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1126.986853] Bluetooth: hci0 command 0x0401 tx timeout [ 1126.993077] Bluetooth: hci3 command 0x0401 tx timeout 14:30:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1127.117813] FAULT_INJECTION: forcing a failure. [ 1127.117813] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.135995] CPU: 1 PID: 6780 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1127.144101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.153477] Call Trace: [ 1127.156091] dump_stack+0x1b2/0x281 [ 1127.159721] should_fail.cold+0x10a/0x149 [ 1127.163876] should_failslab+0xd6/0x130 [ 1127.167847] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1127.172528] wb_congested_get_create+0x15b/0x360 [ 1127.177313] wb_init+0x4f6/0x7c0 [ 1127.180679] ? __raw_spin_lock_init+0x28/0x100 [ 1127.185264] cgwb_bdi_init+0xe2/0x1e0 [ 1127.189054] bdi_alloc_node+0x224/0x2e0 [ 1127.193036] blk_alloc_queue_node+0xe2/0xb40 [ 1127.197438] blk_mq_init_queue+0x42/0x90 [ 1127.201502] loop_add+0x303/0x830 [ 1127.205174] ? loop_queue_rq+0x280/0x280 [ 1127.209226] ? loop_queue_work+0x1e80/0x1e80 [ 1127.213626] ? trace_hardirqs_on+0x10/0x10 [ 1127.217883] loop_control_ioctl+0x11a/0x3f0 [ 1127.222206] ? loop_lookup+0x190/0x190 [ 1127.226087] ? SyS_write+0x1b7/0x210 [ 1127.229796] ? loop_lookup+0x190/0x190 [ 1127.233679] do_vfs_ioctl+0x75a/0xff0 [ 1127.237486] ? ioctl_preallocate+0x1a0/0x1a0 [ 1127.241889] ? lock_downgrade+0x740/0x740 [ 1127.246062] ? __fget+0x225/0x360 [ 1127.249501] ? do_vfs_ioctl+0xff0/0xff0 [ 1127.253485] ? security_file_ioctl+0x83/0xb0 [ 1127.257908] SyS_ioctl+0x7f/0xb0 [ 1127.261287] ? do_vfs_ioctl+0xff0/0xff0 [ 1127.265267] do_syscall_64+0x1d5/0x640 [ 1127.269676] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1127.274890] RIP: 0033:0x4665f9 [ 1127.278075] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.285783] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1127.293039] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1127.300297] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1127.307665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:04 executing program 4 (fault-call:1 fault-nth:22): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1127.314922] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1127.394138] FAULT_INJECTION: forcing a failure. [ 1127.394138] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.420440] CPU: 1 PID: 6794 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1127.428334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.437718] Call Trace: [ 1127.440304] dump_stack+0x1b2/0x281 [ 1127.443933] should_fail.cold+0x10a/0x149 [ 1127.448099] should_failslab+0xd6/0x130 [ 1127.452587] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1127.458391] wb_congested_get_create+0x15b/0x360 [ 1127.463190] wb_init+0x4f6/0x7c0 [ 1127.466556] ? __raw_spin_lock_init+0x28/0x100 [ 1127.471323] cgwb_bdi_init+0xe2/0x1e0 [ 1127.475127] bdi_alloc_node+0x224/0x2e0 [ 1127.479098] blk_alloc_queue_node+0xe2/0xb40 [ 1127.483519] blk_mq_init_queue+0x42/0x90 [ 1127.487576] loop_add+0x303/0x830 [ 1127.491030] ? loop_queue_rq+0x280/0x280 [ 1127.495442] ? loop_queue_work+0x1e80/0x1e80 [ 1127.500026] ? trace_hardirqs_on+0x10/0x10 [ 1127.504965] loop_control_ioctl+0x11a/0x3f0 [ 1127.510166] ? loop_lookup+0x190/0x190 [ 1127.514145] ? SyS_write+0x1b7/0x210 [ 1127.518363] ? loop_lookup+0x190/0x190 [ 1127.522254] do_vfs_ioctl+0x75a/0xff0 [ 1127.526052] ? ioctl_preallocate+0x1a0/0x1a0 [ 1127.530450] ? lock_downgrade+0x740/0x740 [ 1127.534605] ? __fget+0x225/0x360 [ 1127.538066] ? do_vfs_ioctl+0xff0/0xff0 [ 1127.542078] ? security_file_ioctl+0x83/0xb0 [ 1127.546484] SyS_ioctl+0x7f/0xb0 [ 1127.549850] ? do_vfs_ioctl+0xff0/0xff0 [ 1127.553845] do_syscall_64+0x1d5/0x640 [ 1127.557760] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1127.562940] RIP: 0033:0x4665f9 [ 1127.566111] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.573868] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1127.581351] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1127.588624] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1127.595898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1127.603293] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 4 (fault-call:1 fault-nth:23): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1127.743595] FAULT_INJECTION: forcing a failure. [ 1127.743595] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.763166] CPU: 0 PID: 6813 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1127.771010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.780492] Call Trace: [ 1127.783113] dump_stack+0x1b2/0x281 [ 1127.786760] should_fail.cold+0x10a/0x149 [ 1127.790976] should_failslab+0xd6/0x130 [ 1127.795044] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1127.802167] blkg_alloc+0x92/0x5c0 [ 1127.805718] blkcg_init_queue+0x23/0x410 [ 1127.810400] blk_alloc_queue_node+0x826/0xb40 [ 1127.815113] blk_mq_init_queue+0x42/0x90 [ 1127.819635] loop_add+0x303/0x830 [ 1127.823357] ? loop_queue_rq+0x280/0x280 [ 1127.827841] ? loop_queue_work+0x1e80/0x1e80 [ 1127.832265] ? trace_hardirqs_on+0x10/0x10 [ 1127.836629] loop_control_ioctl+0x11a/0x3f0 [ 1127.841038] ? loop_lookup+0x190/0x190 [ 1127.844914] ? SyS_write+0x1b7/0x210 [ 1127.848614] ? loop_lookup+0x190/0x190 [ 1127.852489] do_vfs_ioctl+0x75a/0xff0 [ 1127.856452] ? ioctl_preallocate+0x1a0/0x1a0 [ 1127.860960] ? lock_downgrade+0x740/0x740 [ 1127.865667] ? __fget+0x225/0x360 [ 1127.869293] ? do_vfs_ioctl+0xff0/0xff0 [ 1127.873265] ? security_file_ioctl+0x83/0xb0 [ 1127.877673] SyS_ioctl+0x7f/0xb0 [ 1127.881032] ? do_vfs_ioctl+0xff0/0xff0 [ 1127.885314] do_syscall_64+0x1d5/0x640 [ 1127.889296] entry_SYSCALL_64_after_hwframe+0x46/0xbb 14:30:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1127.894476] RIP: 0033:0x4665f9 [ 1127.897744] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.905475] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1127.912744] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1127.920004] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1127.927269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1127.934618] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:04 executing program 4 (fault-call:1 fault-nth:24): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1128.084013] FAULT_INJECTION: forcing a failure. [ 1128.084013] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.110861] CPU: 1 PID: 6835 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1128.118820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.128794] Call Trace: [ 1128.131518] dump_stack+0x1b2/0x281 [ 1128.135686] should_fail.cold+0x10a/0x149 [ 1128.139849] should_failslab+0xd6/0x130 [ 1128.143834] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1128.149027] blkg_alloc+0x92/0x5c0 [ 1128.152605] blkcg_init_queue+0x23/0x410 [ 1128.157231] blk_alloc_queue_node+0x826/0xb40 [ 1128.161853] blk_mq_init_queue+0x42/0x90 [ 1128.165959] loop_add+0x303/0x830 [ 1128.169430] ? loop_queue_rq+0x280/0x280 [ 1128.173505] ? loop_queue_work+0x1e80/0x1e80 [ 1128.177925] ? trace_hardirqs_on+0x10/0x10 [ 1128.182165] loop_control_ioctl+0x11a/0x3f0 [ 1128.186806] ? loop_lookup+0x190/0x190 [ 1128.190700] ? SyS_write+0x1b7/0x210 [ 1128.194420] ? loop_lookup+0x190/0x190 [ 1128.198305] do_vfs_ioctl+0x75a/0xff0 [ 1128.202118] ? ioctl_preallocate+0x1a0/0x1a0 [ 1128.206517] ? lock_downgrade+0x740/0x740 [ 1128.210690] ? __fget+0x225/0x360 [ 1128.214163] ? do_vfs_ioctl+0xff0/0xff0 [ 1128.218151] ? security_file_ioctl+0x83/0xb0 [ 1128.222673] SyS_ioctl+0x7f/0xb0 [ 1128.226025] ? do_vfs_ioctl+0xff0/0xff0 [ 1128.229994] do_syscall_64+0x1d5/0x640 [ 1128.233899] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1128.239102] RIP: 0033:0x4665f9 [ 1128.242285] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1128.250021] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1128.257301] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1128.264576] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.271835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1128.279219] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 4 (fault-call:1 fault-nth:25): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1128.494910] FAULT_INJECTION: forcing a failure. [ 1128.494910] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.525133] CPU: 0 PID: 6864 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1128.533027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.542386] Call Trace: [ 1128.544972] dump_stack+0x1b2/0x281 [ 1128.548608] should_fail.cold+0x10a/0x149 [ 1128.553762] should_failslab+0xd6/0x130 [ 1128.557753] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1128.562892] throtl_pd_alloc+0x59/0x990 [ 1128.566874] ? throtl_add_bio_tg+0x1e0/0x1e0 [ 1128.571285] blkcg_activate_policy+0x115/0x5c0 [ 1128.575872] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1128.580897] blk_throtl_init+0x408/0x590 [ 1128.584976] blkcg_init_queue+0x18f/0x410 [ 1128.589651] blk_alloc_queue_node+0x826/0xb40 [ 1128.594174] blk_mq_init_queue+0x42/0x90 [ 1128.598501] loop_add+0x303/0x830 [ 1128.601977] ? loop_queue_rq+0x280/0x280 [ 1128.606124] ? loop_queue_work+0x1e80/0x1e80 [ 1128.610534] ? trace_hardirqs_on+0x10/0x10 [ 1128.614773] loop_control_ioctl+0x11a/0x3f0 [ 1128.619120] ? loop_lookup+0x190/0x190 [ 1128.623120] ? SyS_write+0x1b7/0x210 [ 1128.626850] ? loop_lookup+0x190/0x190 [ 1128.630751] do_vfs_ioctl+0x75a/0xff0 [ 1128.634567] ? ioctl_preallocate+0x1a0/0x1a0 [ 1128.638989] ? lock_downgrade+0x740/0x740 [ 1128.643137] ? __fget+0x225/0x360 [ 1128.646598] ? do_vfs_ioctl+0xff0/0xff0 [ 1128.650751] ? security_file_ioctl+0x83/0xb0 [ 1128.655461] SyS_ioctl+0x7f/0xb0 [ 1128.659354] ? do_vfs_ioctl+0xff0/0xff0 [ 1128.663356] do_syscall_64+0x1d5/0x640 [ 1128.667266] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1128.672647] RIP: 0033:0x4665f9 [ 1128.675849] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1128.683657] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 14:30:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1128.690928] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1128.698295] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.705553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1128.712906] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:05 executing program 4 (fault-call:1 fault-nth:26): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1128.838917] FAULT_INJECTION: forcing a failure. [ 1128.838917] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.850501] CPU: 1 PID: 6889 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1128.858312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.867676] Call Trace: [ 1128.870888] dump_stack+0x1b2/0x281 [ 1128.874530] should_fail.cold+0x10a/0x149 [ 1128.878692] should_failslab+0xd6/0x130 [ 1128.882670] kmem_cache_alloc_node_trace+0x58/0x400 [ 1128.887729] throtl_pd_alloc+0x59/0x990 [ 1128.891717] ? throtl_add_bio_tg+0x1e0/0x1e0 [ 1128.896144] blkcg_activate_policy+0x23e/0x5c0 [ 1128.901152] blk_throtl_init+0x408/0x590 [ 1128.905226] blkcg_init_queue+0x18f/0x410 [ 1128.909538] blk_alloc_queue_node+0x826/0xb40 [ 1128.914075] blk_mq_init_queue+0x42/0x90 [ 1128.918148] loop_add+0x303/0x830 [ 1128.921603] ? loop_queue_rq+0x280/0x280 [ 1128.925733] ? loop_queue_work+0x1e80/0x1e80 [ 1128.930180] ? trace_hardirqs_on+0x10/0x10 [ 1128.934441] loop_control_ioctl+0x11a/0x3f0 [ 1128.938954] ? loop_lookup+0x190/0x190 [ 1128.943003] ? SyS_write+0x1b7/0x210 [ 1128.946999] ? loop_lookup+0x190/0x190 [ 1128.950906] do_vfs_ioctl+0x75a/0xff0 [ 1128.954700] ? ioctl_preallocate+0x1a0/0x1a0 [ 1128.959123] ? lock_downgrade+0x740/0x740 [ 1128.963281] ? __fget+0x225/0x360 [ 1128.966745] ? do_vfs_ioctl+0xff0/0xff0 [ 1128.970726] ? security_file_ioctl+0x83/0xb0 [ 1128.975142] SyS_ioctl+0x7f/0xb0 [ 1128.978520] ? do_vfs_ioctl+0xff0/0xff0 [ 1128.982494] do_syscall_64+0x1d5/0x640 [ 1128.986462] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1128.991641] RIP: 0033:0x4665f9 [ 1128.994824] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1129.002720] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1129.010090] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1129.017356] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.026108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 4 (fault-call:1 fault-nth:27): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1129.033532] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1129.057066] Bluetooth: hci3 command 0x0401 tx timeout [ 1129.062560] Bluetooth: hci0 command 0x0401 tx timeout 14:30:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1129.168622] FAULT_INJECTION: forcing a failure. [ 1129.168622] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.179863] CPU: 1 PID: 6911 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1129.187671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.197068] Call Trace: [ 1129.199701] dump_stack+0x1b2/0x281 [ 1129.203333] should_fail.cold+0x10a/0x149 [ 1129.207490] should_failslab+0xd6/0x130 [ 1129.211488] kmem_cache_alloc_node_trace+0x58/0x400 [ 1129.216545] throtl_pd_alloc+0x59/0x990 [ 1129.220511] ? throtl_add_bio_tg+0x1e0/0x1e0 [ 1129.224962] blkcg_activate_policy+0x23e/0x5c0 [ 1129.229814] blk_throtl_init+0x408/0x590 [ 1129.233875] blkcg_init_queue+0x18f/0x410 [ 1129.238204] blk_alloc_queue_node+0x826/0xb40 [ 1129.242699] blk_mq_init_queue+0x42/0x90 [ 1129.246774] loop_add+0x303/0x830 [ 1129.250406] ? loop_queue_rq+0x280/0x280 [ 1129.254456] ? loop_queue_work+0x1e80/0x1e80 [ 1129.258856] ? trace_hardirqs_on+0x10/0x10 [ 1129.263197] loop_control_ioctl+0x11a/0x3f0 [ 1129.267554] ? loop_lookup+0x190/0x190 [ 1129.271458] ? SyS_write+0x1b7/0x210 [ 1129.276249] ? loop_lookup+0x190/0x190 [ 1129.280227] do_vfs_ioctl+0x75a/0xff0 [ 1129.284049] ? ioctl_preallocate+0x1a0/0x1a0 [ 1129.288765] ? lock_downgrade+0x740/0x740 [ 1129.293063] ? __fget+0x225/0x360 [ 1129.298144] ? do_vfs_ioctl+0xff0/0xff0 [ 1129.302379] ? security_file_ioctl+0x83/0xb0 [ 1129.307144] SyS_ioctl+0x7f/0xb0 [ 1129.310504] ? do_vfs_ioctl+0xff0/0xff0 [ 1129.314468] do_syscall_64+0x1d5/0x640 [ 1129.318370] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1129.323840] RIP: 0033:0x4665f9 [ 1129.327364] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1129.335596] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1129.342864] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1129.350149] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.357428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 4 (fault-call:1 fault-nth:28): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1129.364721] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1129.504122] FAULT_INJECTION: forcing a failure. [ 1129.504122] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.528012] CPU: 1 PID: 6936 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1129.535855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.545614] Call Trace: [ 1129.548211] dump_stack+0x1b2/0x281 [ 1129.551913] should_fail.cold+0x10a/0x149 [ 1129.556062] should_failslab+0xd6/0x130 [ 1129.560139] __kmalloc+0x2c1/0x400 [ 1129.563789] ? blk_stat_alloc_callback+0x81/0x2f0 [ 1129.568644] ? blk_mq_can_queue+0x40/0x40 [ 1129.572790] ? queue_set_hctx_shared+0x210/0x210 [ 1129.577549] blk_stat_alloc_callback+0x81/0x2f0 [ 1129.582222] blk_mq_init_allocated_queue+0x80/0xfd0 [ 1129.587236] ? blkcg_init_queue+0x19f/0x410 [ 1129.591596] ? blk_alloc_queue_node+0x82f/0xb40 [ 1129.596260] blk_mq_init_queue+0x5a/0x90 [ 1129.600338] loop_add+0x303/0x830 [ 1129.603791] ? loop_queue_rq+0x280/0x280 [ 1129.607971] ? loop_queue_work+0x1e80/0x1e80 [ 1129.612379] ? trace_hardirqs_on+0x10/0x10 [ 1129.616602] loop_control_ioctl+0x11a/0x3f0 [ 1129.620918] ? loop_lookup+0x190/0x190 [ 1129.624816] ? SyS_write+0x1b7/0x210 [ 1129.628526] ? loop_lookup+0x190/0x190 [ 1129.632412] do_vfs_ioctl+0x75a/0xff0 [ 1129.636299] ? ioctl_preallocate+0x1a0/0x1a0 [ 1129.640699] ? lock_downgrade+0x740/0x740 [ 1129.644858] ? __fget+0x225/0x360 [ 1129.648560] ? do_vfs_ioctl+0xff0/0xff0 [ 1129.652525] ? security_file_ioctl+0x83/0xb0 [ 1129.656949] SyS_ioctl+0x7f/0xb0 [ 1129.661093] ? do_vfs_ioctl+0xff0/0xff0 [ 1129.666312] do_syscall_64+0x1d5/0x640 [ 1129.670697] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1129.678006] RIP: 0033:0x4665f9 [ 1129.681181] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1129.688890] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1129.696162] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 14:30:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1129.703427] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.710787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1129.718154] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 4 (fault-call:1 fault-nth:29): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:06 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1129.858019] FAULT_INJECTION: forcing a failure. [ 1129.858019] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.872399] CPU: 0 PID: 6957 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1129.881081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.890892] Call Trace: [ 1129.893512] dump_stack+0x1b2/0x281 [ 1129.897151] should_fail.cold+0x10a/0x149 [ 1129.901314] should_failslab+0xd6/0x130 [ 1129.905536] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1129.911000] ? blk_mq_can_queue+0x40/0x40 [ 1129.915146] ? queue_set_hctx_shared+0x210/0x210 [ 1129.919901] blk_stat_alloc_callback+0x54/0x2f0 [ 1129.924571] blk_mq_init_allocated_queue+0x80/0xfd0 [ 1129.929585] ? blkcg_init_queue+0x19f/0x410 [ 1129.933903] ? blk_alloc_queue_node+0x82f/0xb40 [ 1129.938621] blk_mq_init_queue+0x5a/0x90 [ 1129.942704] loop_add+0x303/0x830 [ 1129.946150] ? loop_queue_rq+0x280/0x280 [ 1129.951523] ? loop_queue_work+0x1e80/0x1e80 [ 1129.956015] ? trace_hardirqs_on+0x10/0x10 [ 1129.960372] loop_control_ioctl+0x11a/0x3f0 [ 1129.965157] ? loop_lookup+0x190/0x190 [ 1129.969181] ? SyS_write+0x1b7/0x210 [ 1129.973264] ? loop_lookup+0x190/0x190 [ 1129.977173] do_vfs_ioctl+0x75a/0xff0 [ 1129.980988] ? ioctl_preallocate+0x1a0/0x1a0 [ 1129.986449] ? lock_downgrade+0x740/0x740 [ 1129.990863] ? __fget+0x225/0x360 [ 1129.994386] ? do_vfs_ioctl+0xff0/0xff0 [ 1129.999245] ? security_file_ioctl+0x83/0xb0 [ 1130.005754] SyS_ioctl+0x7f/0xb0 [ 1130.009240] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.014249] do_syscall_64+0x1d5/0x640 [ 1130.018140] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1130.024064] RIP: 0033:0x4665f9 [ 1130.027257] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.034995] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1130.042254] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1130.050053] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:30:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:07 executing program 4 (fault-call:1 fault-nth:30): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1130.057441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1130.064780] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1130.168076] FAULT_INJECTION: forcing a failure. [ 1130.168076] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.190748] CPU: 0 PID: 6970 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1130.198606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.207968] Call Trace: [ 1130.210575] dump_stack+0x1b2/0x281 [ 1130.214216] should_fail.cold+0x10a/0x149 [ 1130.218378] should_failslab+0xd6/0x130 [ 1130.222407] __kmalloc+0x2c1/0x400 [ 1130.225960] ? blk_stat_alloc_callback+0x81/0x2f0 [ 1130.230802] ? blk_mq_can_queue+0x40/0x40 [ 1130.234980] ? queue_set_hctx_shared+0x210/0x210 [ 1130.239780] blk_stat_alloc_callback+0x81/0x2f0 [ 1130.244455] blk_mq_init_allocated_queue+0x80/0xfd0 [ 1130.249477] ? blkcg_init_queue+0x19f/0x410 [ 1130.253809] ? blk_alloc_queue_node+0x82f/0xb40 [ 1130.258946] blk_mq_init_queue+0x5a/0x90 [ 1130.263368] loop_add+0x303/0x830 [ 1130.266833] ? loop_queue_rq+0x280/0x280 [ 1130.270905] ? loop_queue_work+0x1e80/0x1e80 [ 1130.275345] ? trace_hardirqs_on+0x10/0x10 [ 1130.279591] loop_control_ioctl+0x11a/0x3f0 [ 1130.283907] ? loop_lookup+0x190/0x190 [ 1130.287808] ? SyS_write+0x1b7/0x210 [ 1130.291548] ? loop_lookup+0x190/0x190 [ 1130.295445] do_vfs_ioctl+0x75a/0xff0 [ 1130.299387] ? ioctl_preallocate+0x1a0/0x1a0 [ 1130.303816] ? lock_downgrade+0x740/0x740 [ 1130.307985] ? __fget+0x225/0x360 [ 1130.311448] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.315433] ? security_file_ioctl+0x83/0xb0 [ 1130.319841] SyS_ioctl+0x7f/0xb0 [ 1130.323199] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.327201] do_syscall_64+0x1d5/0x640 [ 1130.331115] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1130.336309] RIP: 0033:0x4665f9 [ 1130.339506] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.347229] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1130.354504] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1130.361802] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:30:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 4 (fault-call:1 fault-nth:31): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1130.369086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1130.376385] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1130.478011] FAULT_INJECTION: forcing a failure. [ 1130.478011] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.499177] CPU: 0 PID: 6991 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1130.507027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.516395] Call Trace: [ 1130.518996] dump_stack+0x1b2/0x281 [ 1130.522636] should_fail.cold+0x10a/0x149 [ 1130.526800] should_failslab+0xd6/0x130 [ 1130.530784] __kmalloc+0x2c1/0x400 [ 1130.534336] ? blk_stat_alloc_callback+0x81/0x2f0 [ 1130.539190] ? blk_mq_can_queue+0x40/0x40 [ 1130.543352] ? queue_set_hctx_shared+0x210/0x210 [ 1130.548122] blk_stat_alloc_callback+0x81/0x2f0 [ 1130.552917] blk_mq_init_allocated_queue+0x80/0xfd0 [ 1130.557951] ? blkcg_init_queue+0x19f/0x410 [ 1130.562282] ? blk_alloc_queue_node+0x82f/0xb40 [ 1130.566963] blk_mq_init_queue+0x5a/0x90 [ 1130.571038] loop_add+0x303/0x830 [ 1130.574591] ? loop_queue_rq+0x280/0x280 [ 1130.578655] ? loop_queue_work+0x1e80/0x1e80 [ 1130.583054] ? trace_hardirqs_on+0x10/0x10 [ 1130.587297] loop_control_ioctl+0x11a/0x3f0 [ 1130.591651] ? loop_lookup+0x190/0x190 [ 1130.595547] ? SyS_write+0x1b7/0x210 [ 1130.599274] ? loop_lookup+0x190/0x190 [ 1130.603157] do_vfs_ioctl+0x75a/0xff0 [ 1130.607050] ? ioctl_preallocate+0x1a0/0x1a0 [ 1130.611480] ? lock_downgrade+0x740/0x740 [ 1130.615618] ? __fget+0x225/0x360 [ 1130.619059] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.623024] ? security_file_ioctl+0x83/0xb0 [ 1130.627463] SyS_ioctl+0x7f/0xb0 [ 1130.630853] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.634819] do_syscall_64+0x1d5/0x640 [ 1130.638704] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1130.644173] RIP: 0033:0x4665f9 [ 1130.647365] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.655076] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1130.662348] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1130.669756] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:30:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 4 (fault-call:1 fault-nth:32): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1130.677039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1130.684311] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1130.801170] FAULT_INJECTION: forcing a failure. [ 1130.801170] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.834589] CPU: 0 PID: 7013 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 14:30:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1130.842579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.852046] Call Trace: [ 1130.854764] dump_stack+0x1b2/0x281 [ 1130.858410] should_fail.cold+0x10a/0x149 [ 1130.862582] should_failslab+0xd6/0x130 [ 1130.866597] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1130.871763] __kmalloc_node+0x38/0x70 [ 1130.875671] blk_mq_realloc_hw_ctxs+0x1a5/0xe00 [ 1130.880445] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1130.885472] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1130.890796] blk_mq_init_allocated_queue+0x20c/0xfd0 [ 1130.895921] ? blkcg_init_queue+0x19f/0x410 [ 1130.900236] ? blk_alloc_queue_node+0x82f/0xb40 [ 1130.904927] blk_mq_init_queue+0x5a/0x90 [ 1130.908998] loop_add+0x303/0x830 [ 1130.912538] ? loop_queue_rq+0x280/0x280 [ 1130.916772] ? loop_queue_work+0x1e80/0x1e80 [ 1130.921321] ? trace_hardirqs_on+0x10/0x10 [ 1130.925559] loop_control_ioctl+0x11a/0x3f0 [ 1130.929887] ? loop_lookup+0x190/0x190 [ 1130.933796] ? SyS_write+0x1b7/0x210 [ 1130.937572] ? loop_lookup+0x190/0x190 [ 1130.941462] do_vfs_ioctl+0x75a/0xff0 [ 1130.945264] ? ioctl_preallocate+0x1a0/0x1a0 [ 1130.949773] ? lock_downgrade+0x740/0x740 [ 1130.953931] ? __fget+0x225/0x360 [ 1130.957379] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.961363] ? security_file_ioctl+0x83/0xb0 [ 1130.965769] SyS_ioctl+0x7f/0xb0 [ 1130.969249] ? do_vfs_ioctl+0xff0/0xff0 [ 1130.973273] do_syscall_64+0x1d5/0x640 [ 1130.977154] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1130.982335] RIP: 0033:0x4665f9 [ 1130.985509] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1130.993210] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 14:30:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 4 (fault-call:1 fault-nth:33): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1131.000474] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1131.007754] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1131.015078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1131.022382] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1131.107645] FAULT_INJECTION: forcing a failure. [ 1131.107645] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.136774] Bluetooth: hci0 command 0x0401 tx timeout [ 1131.137853] CPU: 0 PID: 7027 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1131.142308] Bluetooth: hci3 command 0x0401 tx timeout [ 1131.149847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.149852] Call Trace: [ 1131.149873] dump_stack+0x1b2/0x281 [ 1131.149887] should_fail.cold+0x10a/0x149 [ 1131.149899] should_failslab+0xd6/0x130 [ 1131.149912] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1131.149923] __kmalloc_node+0x38/0x70 [ 1131.149936] blk_mq_realloc_hw_ctxs+0x1a5/0xe00 [ 1131.149947] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1131.149956] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1131.149971] blk_mq_init_allocated_queue+0x20c/0xfd0 [ 1131.149981] ? blkcg_init_queue+0x19f/0x410 [ 1131.149991] ? blk_alloc_queue_node+0x82f/0xb40 [ 1131.150002] blk_mq_init_queue+0x5a/0x90 [ 1131.150012] loop_add+0x303/0x830 [ 1131.150021] ? loop_queue_rq+0x280/0x280 [ 1131.150027] ? loop_queue_work+0x1e80/0x1e80 [ 1131.150038] ? trace_hardirqs_on+0x10/0x10 [ 1131.150050] loop_control_ioctl+0x11a/0x3f0 [ 1131.150059] ? loop_lookup+0x190/0x190 [ 1131.150068] ? SyS_write+0x1b7/0x210 [ 1131.150080] ? loop_lookup+0x190/0x190 [ 1131.253011] do_vfs_ioctl+0x75a/0xff0 [ 1131.256832] ? ioctl_preallocate+0x1a0/0x1a0 [ 1131.261252] ? lock_downgrade+0x740/0x740 [ 1131.265410] ? __fget+0x225/0x360 [ 1131.268881] ? do_vfs_ioctl+0xff0/0xff0 [ 1131.272886] ? security_file_ioctl+0x83/0xb0 [ 1131.277332] SyS_ioctl+0x7f/0xb0 [ 1131.280710] ? do_vfs_ioctl+0xff0/0xff0 [ 1131.284706] do_syscall_64+0x1d5/0x640 [ 1131.288631] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1131.293826] RIP: 0033:0x4665f9 [ 1131.297008] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:30:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:08 executing program 4 (fault-call:1 fault-nth:34): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1131.304723] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1131.311981] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1131.319252] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1131.326612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1131.333881] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, 0x0, 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1131.460205] FAULT_INJECTION: forcing a failure. [ 1131.460205] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.475864] CPU: 0 PID: 7053 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1131.483701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.493067] Call Trace: [ 1131.495669] dump_stack+0x1b2/0x281 [ 1131.499306] should_fail.cold+0x10a/0x149 [ 1131.503473] should_failslab+0xd6/0x130 [ 1131.507460] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1131.512569] __kmalloc_node+0x38/0x70 [ 1131.516361] sbitmap_init_node+0x10c/0x3d0 [ 1131.520592] blk_mq_realloc_hw_ctxs+0x59b/0xe00 [ 1131.525288] blk_mq_init_allocated_queue+0x20c/0xfd0 [ 1131.530391] ? blkcg_init_queue+0x19f/0x410 [ 1131.534719] ? blk_alloc_queue_node+0x82f/0xb40 [ 1131.539391] blk_mq_init_queue+0x5a/0x90 [ 1131.543452] loop_add+0x303/0x830 [ 1131.546907] ? loop_queue_rq+0x280/0x280 [ 1131.551001] ? loop_queue_work+0x1e80/0x1e80 [ 1131.555411] ? trace_hardirqs_on+0x10/0x10 [ 1131.559638] loop_control_ioctl+0x11a/0x3f0 [ 1131.563969] ? loop_lookup+0x190/0x190 [ 1131.567855] ? SyS_write+0x1b7/0x210 [ 1131.571593] ? loop_lookup+0x190/0x190 [ 1131.575469] do_vfs_ioctl+0x75a/0xff0 [ 1131.579262] ? ioctl_preallocate+0x1a0/0x1a0 [ 1131.583658] ? lock_downgrade+0x740/0x740 [ 1131.587815] ? __fget+0x225/0x360 [ 1131.591280] ? do_vfs_ioctl+0xff0/0xff0 [ 1131.595331] ? security_file_ioctl+0x83/0xb0 [ 1131.599743] SyS_ioctl+0x7f/0xb0 [ 1131.603099] ? do_vfs_ioctl+0xff0/0xff0 [ 1131.607073] do_syscall_64+0x1d5/0x640 [ 1131.610969] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1131.616164] RIP: 0033:0x4665f9 [ 1131.619366] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1131.627070] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1131.634341] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1131.641621] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1131.648893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:30:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1131.656176] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 4 (fault-call:1 fault-nth:35): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:08 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:08 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1131.822159] FAULT_INJECTION: forcing a failure. [ 1131.822159] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.854701] CPU: 1 PID: 7077 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1131.862662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.872028] Call Trace: [ 1131.874679] dump_stack+0x1b2/0x281 [ 1131.881580] should_fail.cold+0x10a/0x149 [ 1131.885737] should_failslab+0xd6/0x130 [ 1131.889726] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1131.894957] blk_mq_init_tags+0x5e/0x280 [ 1131.899032] blk_mq_alloc_rq_map+0x90/0x220 [ 1131.903352] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1131.908018] blk_mq_init_sched+0x18d/0x4a0 [ 1131.912258] ? _raw_spin_unlock+0x29/0x40 [ 1131.916409] elevator_init+0x2ee/0x410 [ 1131.920316] blk_mq_sched_init+0x28/0x40 [ 1131.924811] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1131.930559] blk_mq_init_queue+0x5a/0x90 [ 1131.934634] loop_add+0x303/0x830 [ 1131.938097] ? loop_queue_rq+0x280/0x280 [ 1131.942189] ? loop_queue_work+0x1e80/0x1e80 [ 1131.946625] ? trace_hardirqs_on+0x10/0x10 [ 1131.950982] loop_control_ioctl+0x11a/0x3f0 [ 1131.955441] ? loop_lookup+0x190/0x190 [ 1131.959333] ? SyS_write+0x1b7/0x210 [ 1131.963078] ? loop_lookup+0x190/0x190 [ 1131.966967] do_vfs_ioctl+0x75a/0xff0 [ 1131.970764] ? ioctl_preallocate+0x1a0/0x1a0 [ 1131.975172] ? lock_downgrade+0x740/0x740 [ 1131.979439] ? __fget+0x225/0x360 [ 1131.982890] ? do_vfs_ioctl+0xff0/0xff0 [ 1131.987000] ? security_file_ioctl+0x83/0xb0 [ 1131.991425] SyS_ioctl+0x7f/0xb0 [ 1131.994788] ? do_vfs_ioctl+0xff0/0xff0 [ 1131.998873] do_syscall_64+0x1d5/0x640 [ 1132.002970] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1132.008159] RIP: 0033:0x4665f9 [ 1132.011349] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1132.019236] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1132.026513] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1132.033802] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.041250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1132.048514] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:09 executing program 4 (fault-call:1 fault-nth:36): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1132.183757] FAULT_INJECTION: forcing a failure. [ 1132.183757] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.204271] CPU: 0 PID: 7099 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1132.212118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.221471] Call Trace: [ 1132.224091] dump_stack+0x1b2/0x281 [ 1132.227758] should_fail.cold+0x10a/0x149 [ 1132.231912] should_failslab+0xd6/0x130 [ 1132.235962] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1132.241071] blk_mq_init_tags+0x5e/0x280 [ 1132.245131] blk_mq_alloc_rq_map+0x90/0x220 [ 1132.249470] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1132.254165] blk_mq_init_sched+0x18d/0x4a0 [ 1132.258408] ? _raw_spin_unlock+0x29/0x40 [ 1132.262603] elevator_init+0x2ee/0x410 [ 1132.266491] blk_mq_sched_init+0x28/0x40 [ 1132.270563] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1132.275672] blk_mq_init_queue+0x5a/0x90 [ 1132.279720] loop_add+0x303/0x830 [ 1132.283177] ? loop_queue_rq+0x280/0x280 [ 1132.287230] ? loop_queue_work+0x1e80/0x1e80 [ 1132.291650] ? trace_hardirqs_on+0x10/0x10 [ 1132.295891] loop_control_ioctl+0x11a/0x3f0 [ 1132.300206] ? loop_lookup+0x190/0x190 [ 1132.304079] ? SyS_write+0x1b7/0x210 [ 1132.307805] ? loop_lookup+0x190/0x190 [ 1132.311690] do_vfs_ioctl+0x75a/0xff0 [ 1132.315514] ? ioctl_preallocate+0x1a0/0x1a0 [ 1132.319912] ? lock_downgrade+0x740/0x740 [ 1132.324083] ? __fget+0x225/0x360 [ 1132.327558] ? do_vfs_ioctl+0xff0/0xff0 [ 1132.331518] ? security_file_ioctl+0x83/0xb0 [ 1132.335915] SyS_ioctl+0x7f/0xb0 [ 1132.339270] ? do_vfs_ioctl+0xff0/0xff0 [ 1132.343368] do_syscall_64+0x1d5/0x640 [ 1132.347271] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1132.352520] RIP: 0033:0x4665f9 [ 1132.355727] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1132.363454] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1132.370743] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 14:30:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1132.378130] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.385389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1132.392648] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 4 (fault-call:1 fault-nth:37): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1132.563440] FAULT_INJECTION: forcing a failure. [ 1132.563440] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.592786] CPU: 0 PID: 7121 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1132.600769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.610120] Call Trace: [ 1132.612743] dump_stack+0x1b2/0x281 [ 1132.616375] should_fail.cold+0x10a/0x149 [ 1132.620558] should_failslab+0xd6/0x130 [ 1132.624530] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1132.629645] sbitmap_queue_init_node+0x27f/0x5d0 [ 1132.634423] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1132.639707] blk_mq_init_tags+0xf4/0x280 [ 1132.643769] blk_mq_alloc_rq_map+0x90/0x220 [ 1132.648201] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1132.652948] blk_mq_init_sched+0x18d/0x4a0 [ 1132.657289] ? _raw_spin_unlock+0x29/0x40 [ 1132.661459] elevator_init+0x2ee/0x410 [ 1132.665469] blk_mq_sched_init+0x28/0x40 [ 1132.669694] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1132.675066] blk_mq_init_queue+0x5a/0x90 [ 1132.679139] loop_add+0x303/0x830 [ 1132.682591] ? loop_queue_rq+0x280/0x280 [ 1132.686888] ? loop_queue_work+0x1e80/0x1e80 [ 1132.691315] ? trace_hardirqs_on+0x10/0x10 [ 1132.695568] loop_control_ioctl+0x11a/0x3f0 [ 1132.699965] ? loop_lookup+0x190/0x190 [ 1132.703854] ? SyS_write+0x1b7/0x210 [ 1132.707571] ? loop_lookup+0x190/0x190 [ 1132.711474] do_vfs_ioctl+0x75a/0xff0 [ 1132.715277] ? ioctl_preallocate+0x1a0/0x1a0 [ 1132.719696] ? lock_downgrade+0x740/0x740 [ 1132.723843] ? __fget+0x225/0x360 [ 1132.727298] ? do_vfs_ioctl+0xff0/0xff0 [ 1132.731286] ? security_file_ioctl+0x83/0xb0 [ 1132.735698] SyS_ioctl+0x7f/0xb0 [ 1132.739063] ? do_vfs_ioctl+0xff0/0xff0 [ 1132.743074] do_syscall_64+0x1d5/0x640 [ 1132.746975] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1132.752169] RIP: 0033:0x4665f9 [ 1132.755381] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:30:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1132.763182] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1132.770548] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1132.777903] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1132.785189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1132.792488] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:09 executing program 4 (fault-call:1 fault-nth:38): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1132.925619] FAULT_INJECTION: forcing a failure. [ 1132.925619] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.945395] CPU: 1 PID: 7143 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1132.953256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.962903] Call Trace: [ 1132.965488] dump_stack+0x1b2/0x281 [ 1132.969362] should_fail.cold+0x10a/0x149 [ 1132.973515] should_failslab+0xd6/0x130 [ 1132.977539] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1132.982649] sbitmap_queue_init_node+0x27f/0x5d0 [ 1132.987445] ? kmem_cache_alloc_node_trace+0x383/0x400 [ 1132.992763] blk_mq_init_tags+0x14b/0x280 [ 1132.997026] blk_mq_alloc_rq_map+0x90/0x220 [ 1133.001408] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1133.006079] blk_mq_init_sched+0x18d/0x4a0 [ 1133.010357] ? _raw_spin_unlock+0x29/0x40 [ 1133.014535] elevator_init+0x2ee/0x410 [ 1133.018414] blk_mq_sched_init+0x28/0x40 [ 1133.022700] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1133.028050] blk_mq_init_queue+0x5a/0x90 [ 1133.032111] loop_add+0x303/0x830 [ 1133.035859] ? loop_queue_rq+0x280/0x280 [ 1133.039932] ? loop_queue_work+0x1e80/0x1e80 [ 1133.044355] ? trace_hardirqs_on+0x10/0x10 [ 1133.049091] loop_control_ioctl+0x11a/0x3f0 [ 1133.053432] ? loop_lookup+0x190/0x190 [ 1133.057342] ? SyS_write+0x1b7/0x210 [ 1133.061055] ? loop_lookup+0x190/0x190 [ 1133.064938] do_vfs_ioctl+0x75a/0xff0 [ 1133.068857] ? ioctl_preallocate+0x1a0/0x1a0 [ 1133.073373] ? lock_downgrade+0x740/0x740 [ 1133.077538] ? __fget+0x225/0x360 [ 1133.081016] ? do_vfs_ioctl+0xff0/0xff0 [ 1133.085391] ? security_file_ioctl+0x83/0xb0 [ 1133.089808] SyS_ioctl+0x7f/0xb0 [ 1133.093175] ? do_vfs_ioctl+0xff0/0xff0 [ 1133.097274] do_syscall_64+0x1d5/0x640 [ 1133.101320] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1133.106683] RIP: 0033:0x4665f9 [ 1133.110255] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1133.118020] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 14:30:10 executing program 4 (fault-call:1 fault-nth:39): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1133.125424] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1133.132838] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.140251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1133.147551] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1133.216991] Bluetooth: hci3 command 0x0401 tx timeout [ 1133.222587] Bluetooth: hci0 command 0x0401 tx timeout [ 1133.272279] FAULT_INJECTION: forcing a failure. [ 1133.272279] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.295355] CPU: 1 PID: 7162 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1133.303330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.312799] Call Trace: [ 1133.315397] dump_stack+0x1b2/0x281 [ 1133.319020] should_fail.cold+0x10a/0x149 [ 1133.323173] should_failslab+0xd6/0x130 [ 1133.327148] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1133.332371] __kmalloc_node+0x38/0x70 [ 1133.336168] blk_mq_alloc_rq_map+0xd2/0x220 [ 1133.340497] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1133.345177] blk_mq_init_sched+0x18d/0x4a0 [ 1133.349420] ? _raw_spin_unlock+0x29/0x40 [ 1133.353817] elevator_init+0x2ee/0x410 [ 1133.358497] blk_mq_sched_init+0x28/0x40 [ 1133.362759] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1133.368387] blk_mq_init_queue+0x5a/0x90 [ 1133.373656] loop_add+0x303/0x830 [ 1133.377494] ? loop_queue_rq+0x280/0x280 [ 1133.383556] ? loop_queue_work+0x1e80/0x1e80 [ 1133.390235] ? trace_hardirqs_on+0x10/0x10 [ 1133.394468] loop_control_ioctl+0x11a/0x3f0 [ 1133.398908] ? loop_lookup+0x190/0x190 [ 1133.403149] ? SyS_write+0x1b7/0x210 [ 1133.407143] ? loop_lookup+0x190/0x190 [ 1133.411056] do_vfs_ioctl+0x75a/0xff0 [ 1133.414865] ? ioctl_preallocate+0x1a0/0x1a0 [ 1133.419265] ? lock_downgrade+0x740/0x740 [ 1133.423410] ? __fget+0x225/0x360 [ 1133.426868] ? do_vfs_ioctl+0xff0/0xff0 [ 1133.431035] ? security_file_ioctl+0x83/0xb0 [ 1133.435435] SyS_ioctl+0x7f/0xb0 [ 1133.438800] ? do_vfs_ioctl+0xff0/0xff0 [ 1133.442782] do_syscall_64+0x1d5/0x640 [ 1133.446708] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1133.452007] RIP: 0033:0x4665f9 [ 1133.455198] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1133.465804] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 14:30:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1133.473170] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1133.480663] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.487939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1133.495306] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 4 (fault-call:1 fault-nth:40): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1133.642430] FAULT_INJECTION: forcing a failure. [ 1133.642430] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.685782] CPU: 1 PID: 7185 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1133.693709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.703717] Call Trace: [ 1133.707222] dump_stack+0x1b2/0x281 [ 1133.714305] should_fail.cold+0x10a/0x149 [ 1133.718674] should_failslab+0xd6/0x130 [ 1133.723448] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1133.729440] __kmalloc_node+0x38/0x70 [ 1133.733586] blk_mq_alloc_rq_map+0x113/0x220 [ 1133.737999] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1133.742697] blk_mq_init_sched+0x18d/0x4a0 [ 1133.748060] ? _raw_spin_unlock+0x29/0x40 [ 1133.752223] elevator_init+0x2ee/0x410 [ 1133.756384] blk_mq_sched_init+0x28/0x40 [ 1133.760454] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1133.765582] blk_mq_init_queue+0x5a/0x90 [ 1133.769638] loop_add+0x303/0x830 [ 1133.773499] ? loop_queue_rq+0x280/0x280 [ 1133.777579] ? loop_queue_work+0x1e80/0x1e80 [ 1133.782046] ? trace_hardirqs_on+0x10/0x10 [ 1133.786295] loop_control_ioctl+0x11a/0x3f0 [ 1133.790895] ? loop_lookup+0x190/0x190 [ 1133.795073] ? SyS_write+0x1b7/0x210 [ 1133.798911] ? loop_lookup+0x190/0x190 [ 1133.803286] do_vfs_ioctl+0x75a/0xff0 [ 1133.807390] ? ioctl_preallocate+0x1a0/0x1a0 [ 1133.811870] ? lock_downgrade+0x740/0x740 [ 1133.817683] ? __fget+0x225/0x360 [ 1133.822089] ? do_vfs_ioctl+0xff0/0xff0 [ 1133.826256] ? security_file_ioctl+0x83/0xb0 [ 1133.831003] SyS_ioctl+0x7f/0xb0 [ 1133.834502] ? do_vfs_ioctl+0xff0/0xff0 [ 1133.844198] do_syscall_64+0x1d5/0x640 [ 1133.848089] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1133.853289] RIP: 0033:0x4665f9 [ 1133.856823] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1133.865241] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1133.872982] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1133.880352] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.888050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1133.895319] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:10 executing program 4 (fault-call:1 fault-nth:41): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1134.062852] FAULT_INJECTION: forcing a failure. [ 1134.062852] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.075442] CPU: 0 PID: 7212 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1134.083363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.093242] Call Trace: [ 1134.096264] dump_stack+0x1b2/0x281 [ 1134.100159] should_fail.cold+0x10a/0x149 [ 1134.104326] should_failslab+0xd6/0x130 [ 1134.108583] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1134.113889] __kmalloc_node+0x38/0x70 [ 1134.118073] blk_mq_alloc_rq_map+0x113/0x220 [ 1134.122739] blk_mq_sched_alloc_tags+0xaa/0x240 [ 1134.128570] blk_mq_init_sched+0x18d/0x4a0 [ 1134.133474] ? _raw_spin_unlock+0x29/0x40 [ 1134.138711] elevator_init+0x2ee/0x410 [ 1134.142908] blk_mq_sched_init+0x28/0x40 [ 1134.148278] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1134.156235] blk_mq_init_queue+0x5a/0x90 [ 1134.160417] loop_add+0x303/0x830 [ 1134.163964] ? loop_queue_rq+0x280/0x280 [ 1134.168027] ? loop_queue_work+0x1e80/0x1e80 [ 1134.172431] ? trace_hardirqs_on+0x10/0x10 [ 1134.176664] loop_control_ioctl+0x11a/0x3f0 [ 1134.180984] ? loop_lookup+0x190/0x190 [ 1134.184895] ? SyS_write+0x1b7/0x210 [ 1134.188619] ? loop_lookup+0x190/0x190 [ 1134.192612] do_vfs_ioctl+0x75a/0xff0 [ 1134.196417] ? ioctl_preallocate+0x1a0/0x1a0 [ 1134.200816] ? lock_downgrade+0x740/0x740 [ 1134.208262] ? __fget+0x225/0x360 [ 1134.211910] ? do_vfs_ioctl+0xff0/0xff0 [ 1134.217144] ? security_file_ioctl+0x83/0xb0 [ 1134.221964] SyS_ioctl+0x7f/0xb0 [ 1134.225710] ? do_vfs_ioctl+0xff0/0xff0 [ 1134.229699] do_syscall_64+0x1d5/0x640 [ 1134.233690] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1134.239235] RIP: 0033:0x4665f9 [ 1134.242470] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1134.251413] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1134.259923] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1134.267210] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.274478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1134.281912] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:11 executing program 4 (fault-call:1 fault-nth:42): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1134.487048] FAULT_INJECTION: forcing a failure. [ 1134.487048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1134.508165] CPU: 1 PID: 7245 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1134.516189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.525561] Call Trace: [ 1134.528163] dump_stack+0x1b2/0x281 [ 1134.531807] should_fail.cold+0x10a/0x149 [ 1134.536000] __alloc_pages_nodemask+0x22c/0x2720 [ 1134.540765] ? kasan_kmalloc+0xeb/0x160 [ 1134.544784] ? blk_mq_alloc_rq_map+0x113/0x220 [ 1134.549383] ? blk_mq_sched_alloc_tags+0xaa/0x240 [ 1134.554326] ? elevator_init+0x2ee/0x410 [ 1134.558433] ? blk_mq_sched_init+0x28/0x40 [ 1134.562664] ? blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1134.567958] ? loop_control_ioctl+0x11a/0x3f0 [ 1134.572469] ? do_vfs_ioctl+0x75a/0xff0 [ 1134.579973] ? do_syscall_64+0x1d5/0x640 [ 1134.584024] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1134.589456] ? __mutex_unlock_slowpath+0x75/0x770 [ 1134.594302] ? fs_reclaim_release+0xd0/0x110 [ 1134.598700] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1134.603540] ? __lockdep_init_map+0x100/0x560 [ 1134.608161] ? _find_next_bit+0xdb/0x100 [ 1134.612394] ? __cpu_to_node+0x7b/0xa0 [ 1134.616283] ? blk_mq_hw_queue_to_node+0x9f/0xf0 [ 1134.621311] blk_mq_alloc_rqs+0x227/0x6d0 [ 1134.625484] ? blk_mq_alloc_rq_map+0x9d/0x220 [ 1134.629992] blk_mq_sched_alloc_tags+0x112/0x240 [ 1134.634755] blk_mq_init_sched+0x18d/0x4a0 [ 1134.639002] ? _raw_spin_unlock+0x29/0x40 [ 1134.643179] elevator_init+0x2ee/0x410 [ 1134.647072] blk_mq_sched_init+0x28/0x40 [ 1134.651155] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1134.656357] blk_mq_init_queue+0x5a/0x90 [ 1134.660419] loop_add+0x303/0x830 [ 1134.664003] ? loop_queue_rq+0x280/0x280 [ 1134.668067] ? loop_queue_work+0x1e80/0x1e80 [ 1134.672493] ? trace_hardirqs_on+0x10/0x10 [ 1134.676732] loop_control_ioctl+0x11a/0x3f0 [ 1134.681091] ? loop_lookup+0x190/0x190 [ 1134.685158] ? SyS_write+0x1b7/0x210 [ 1134.688869] ? loop_lookup+0x190/0x190 [ 1134.692747] do_vfs_ioctl+0x75a/0xff0 [ 1134.696537] ? ioctl_preallocate+0x1a0/0x1a0 [ 1134.700939] ? lock_downgrade+0x740/0x740 [ 1134.705084] ? __fget+0x225/0x360 [ 1134.708533] ? do_vfs_ioctl+0xff0/0xff0 [ 1134.713148] ? security_file_ioctl+0x83/0xb0 [ 1134.718886] SyS_ioctl+0x7f/0xb0 [ 1134.722746] ? do_vfs_ioctl+0xff0/0xff0 [ 1134.728485] do_syscall_64+0x1d5/0x640 [ 1134.732530] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1134.737953] RIP: 0033:0x4665f9 [ 1134.741131] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1134.749230] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1134.756513] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1134.764040] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1134.771362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1134.778800] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:11 executing program 4 (fault-call:1 fault-nth:43): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1134.936481] FAULT_INJECTION: forcing a failure. [ 1134.936481] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.970185] CPU: 0 PID: 7270 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1134.979111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.990229] Call Trace: [ 1134.993454] dump_stack+0x1b2/0x281 [ 1134.998092] should_fail.cold+0x10a/0x149 [ 1135.002248] should_failslab+0xd6/0x130 [ 1135.006321] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1135.011794] elevator_alloc+0x7a/0x1f0 [ 1135.015869] dd_init_queue+0x20/0x420 [ 1135.019691] blk_mq_init_sched+0x214/0x4a0 [ 1135.024574] ? _raw_spin_unlock+0x29/0x40 [ 1135.028821] elevator_init+0x2ee/0x410 [ 1135.033005] blk_mq_sched_init+0x28/0x40 [ 1135.037249] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1135.042387] blk_mq_init_queue+0x5a/0x90 [ 1135.050808] loop_add+0x303/0x830 [ 1135.054282] ? loop_queue_rq+0x280/0x280 [ 1135.058743] ? loop_queue_work+0x1e80/0x1e80 [ 1135.063156] ? trace_hardirqs_on+0x10/0x10 [ 1135.067409] loop_control_ioctl+0x11a/0x3f0 [ 1135.072630] ? loop_lookup+0x190/0x190 [ 1135.076791] ? SyS_write+0x1b7/0x210 [ 1135.080522] ? loop_lookup+0x190/0x190 [ 1135.084460] do_vfs_ioctl+0x75a/0xff0 [ 1135.088266] ? ioctl_preallocate+0x1a0/0x1a0 [ 1135.092689] ? lock_downgrade+0x740/0x740 [ 1135.096861] ? __fget+0x225/0x360 [ 1135.100307] ? do_vfs_ioctl+0xff0/0xff0 [ 1135.104281] ? security_file_ioctl+0x83/0xb0 [ 1135.108796] SyS_ioctl+0x7f/0xb0 [ 1135.112173] ? do_vfs_ioctl+0xff0/0xff0 [ 1135.116169] do_syscall_64+0x1d5/0x640 [ 1135.120187] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1135.125398] RIP: 0033:0x4665f9 [ 1135.128574] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:30:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 4 (fault-call:1 fault-nth:44): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1135.136341] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1135.143614] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1135.151060] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1135.158508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1135.166084] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1135.291412] FAULT_INJECTION: forcing a failure. [ 1135.291412] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.303081] Bluetooth: hci0 command 0x0401 tx timeout [ 1135.309064] Bluetooth: hci3 command 0x0401 tx timeout [ 1135.318496] CPU: 1 PID: 7289 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1135.326330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.335866] Call Trace: [ 1135.338456] dump_stack+0x1b2/0x281 [ 1135.342088] should_fail.cold+0x10a/0x149 [ 1135.346269] should_failslab+0xd6/0x130 [ 1135.350262] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1135.355541] dd_init_queue+0x94/0x420 [ 1135.359545] blk_mq_init_sched+0x214/0x4a0 [ 1135.363785] ? _raw_spin_unlock+0x29/0x40 [ 1135.367930] elevator_init+0x2ee/0x410 [ 1135.372265] blk_mq_sched_init+0x28/0x40 [ 1135.376333] blk_mq_init_allocated_queue+0xca0/0xfd0 [ 1135.381489] blk_mq_init_queue+0x5a/0x90 [ 1135.385543] loop_add+0x303/0x830 [ 1135.388994] ? loop_queue_rq+0x280/0x280 [ 1135.393056] ? loop_queue_work+0x1e80/0x1e80 [ 1135.397586] ? trace_hardirqs_on+0x10/0x10 [ 1135.401827] loop_control_ioctl+0x11a/0x3f0 [ 1135.406145] ? loop_lookup+0x190/0x190 [ 1135.410033] ? SyS_write+0x1b7/0x210 [ 1135.413738] ? loop_lookup+0x190/0x190 [ 1135.417611] do_vfs_ioctl+0x75a/0xff0 [ 1135.421406] ? ioctl_preallocate+0x1a0/0x1a0 [ 1135.425819] ? lock_downgrade+0x740/0x740 [ 1135.429963] ? __fget+0x225/0x360 [ 1135.433408] ? do_vfs_ioctl+0xff0/0xff0 [ 1135.437373] ? security_file_ioctl+0x83/0xb0 [ 1135.441774] SyS_ioctl+0x7f/0xb0 [ 1135.445252] ? do_vfs_ioctl+0xff0/0xff0 [ 1135.449217] do_syscall_64+0x1d5/0x640 [ 1135.453110] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1135.458297] RIP: 0033:0x4665f9 [ 1135.461472] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1135.469175] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1135.476558] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1135.484176] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:30:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 1135.491998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1135.499856] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 4 (fault-call:1 fault-nth:45): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1135.709249] FAULT_INJECTION: forcing a failure. [ 1135.709249] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.745070] CPU: 1 PID: 7325 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1135.753649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.763692] Call Trace: [ 1135.766292] dump_stack+0x1b2/0x281 [ 1135.770034] should_fail.cold+0x10a/0x149 [ 1135.774185] should_failslab+0xd6/0x130 [ 1135.778502] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1135.783616] alloc_disk_node+0x5d/0x3d0 [ 1135.787598] loop_add+0x3cb/0x830 [ 1135.791040] ? loop_queue_rq+0x280/0x280 [ 1135.795120] ? loop_queue_work+0x1e80/0x1e80 [ 1135.806053] ? trace_hardirqs_on+0x10/0x10 [ 1135.815411] loop_control_ioctl+0x11a/0x3f0 [ 1135.820121] ? loop_lookup+0x190/0x190 [ 1135.824629] ? SyS_write+0x1b7/0x210 [ 1135.829593] ? loop_lookup+0x190/0x190 [ 1135.834637] do_vfs_ioctl+0x75a/0xff0 [ 1135.839811] ? ioctl_preallocate+0x1a0/0x1a0 [ 1135.844240] ? lock_downgrade+0x740/0x740 [ 1135.848390] ? __fget+0x225/0x360 [ 1135.851844] ? do_vfs_ioctl+0xff0/0xff0 [ 1135.855923] ? security_file_ioctl+0x83/0xb0 [ 1135.860371] SyS_ioctl+0x7f/0xb0 [ 1135.863773] ? do_vfs_ioctl+0xff0/0xff0 [ 1135.867760] do_syscall_64+0x1d5/0x640 [ 1135.871644] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1135.876847] RIP: 0033:0x4665f9 [ 1135.880042] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1135.888400] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1135.895668] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1135.902934] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:30:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, 0x0, &(0x7f0000000180), 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1135.910323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1135.917587] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, 0x0, 0x0) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:12 executing program 4 (fault-call:1 fault-nth:46): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:13 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r0, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r0, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r2 = accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r2, 0x0, &(0x7f00000005c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1136.078193] FAULT_INJECTION: forcing a failure. [ 1136.078193] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.104232] CPU: 1 PID: 7351 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1136.112326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.121693] Call Trace: [ 1136.124321] dump_stack+0x1b2/0x281 14:30:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1136.127976] should_fail.cold+0x10a/0x149 [ 1136.132173] should_failslab+0xd6/0x130 [ 1136.136166] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1136.141300] __kmalloc_node+0x38/0x70 [ 1136.145134] disk_expand_part_tbl+0x17a/0x340 [ 1136.149658] alloc_disk_node+0xf1/0x3d0 [ 1136.153655] loop_add+0x3cb/0x830 [ 1136.157119] ? loop_queue_rq+0x280/0x280 [ 1136.161180] ? loop_queue_work+0x1e80/0x1e80 [ 1136.165614] ? trace_hardirqs_on+0x10/0x10 [ 1136.169848] loop_control_ioctl+0x11a/0x3f0 [ 1136.174173] ? loop_lookup+0x190/0x190 [ 1136.178056] ? SyS_write+0x1b7/0x210 [ 1136.181774] ? loop_lookup+0x190/0x190 [ 1136.185684] do_vfs_ioctl+0x75a/0xff0 [ 1136.189536] ? ioctl_preallocate+0x1a0/0x1a0 [ 1136.193930] ? lock_downgrade+0x740/0x740 [ 1136.198093] ? __fget+0x225/0x360 [ 1136.201536] ? do_vfs_ioctl+0xff0/0xff0 [ 1136.205510] ? security_file_ioctl+0x83/0xb0 [ 1136.209924] SyS_ioctl+0x7f/0xb0 [ 1136.213316] ? do_vfs_ioctl+0xff0/0xff0 [ 1136.217301] do_syscall_64+0x1d5/0x640 [ 1136.221192] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1136.226377] RIP: 0033:0x4665f9 [ 1136.229578] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1136.237286] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1136.244578] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1136.251872] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1136.259167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1136.266579] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 4 (fault-call:1 fault-nth:47): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 14:30:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1136.458629] FAULT_INJECTION: forcing a failure. [ 1136.458629] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.503359] CPU: 1 PID: 7381 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1136.511214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.520572] Call Trace: [ 1136.523165] dump_stack+0x1b2/0x281 [ 1136.526831] should_fail.cold+0x10a/0x149 [ 1136.531009] should_failslab+0xd6/0x130 [ 1136.535001] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1136.539711] rand_initialize_disk+0x3b/0xc0 [ 1136.544043] alloc_disk_node+0x1f7/0x3d0 [ 1136.548121] loop_add+0x3cb/0x830 [ 1136.551577] ? loop_queue_rq+0x280/0x280 [ 1136.555795] ? loop_queue_work+0x1e80/0x1e80 [ 1136.560215] ? trace_hardirqs_on+0x10/0x10 [ 1136.564467] loop_control_ioctl+0x11a/0x3f0 [ 1136.568796] ? loop_lookup+0x190/0x190 [ 1136.572677] ? SyS_write+0x1b7/0x210 [ 1136.576411] ? loop_lookup+0x190/0x190 [ 1136.580399] do_vfs_ioctl+0x75a/0xff0 [ 1136.584200] ? ioctl_preallocate+0x1a0/0x1a0 [ 1136.588606] ? lock_downgrade+0x740/0x740 [ 1136.592751] ? __fget+0x225/0x360 [ 1136.596204] ? do_vfs_ioctl+0xff0/0xff0 [ 1136.600167] ? security_file_ioctl+0x83/0xb0 [ 1136.604566] SyS_ioctl+0x7f/0xb0 [ 1136.607961] ? do_vfs_ioctl+0xff0/0xff0 [ 1136.611941] do_syscall_64+0x1d5/0x640 [ 1136.615821] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1136.621004] RIP: 0033:0x4665f9 [ 1136.624180] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1136.631908] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1136.639184] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1136.646460] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 14:30:13 executing program 4 (fault-call:1 fault-nth:48): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1136.653723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1136.660984] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 14:30:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000600), 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 14:30:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(0x0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x1008, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x100800) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) 14:30:13 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000040), &(0x7f0000000080)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[]) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000001c0)={0xa, {0x3, 0x7, 0x24}}, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000005080), 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000600)=0x14, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000640)={0x0, 0x1, 0x6}, 0x10) write$FUSE_ATTR(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x1000, 0x5) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000780)=""/129, 0x81, 0x0, 0x0, 0x0) connect$packet(r1, &(0x7f0000000440)={0x11, 0x1c, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) r3 = accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14, 0x0) accept$packet(r3, 0x0, &(0x7f00000005c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x14}, 0xc) [ 1136.783240] FAULT_INJECTION: forcing a failure. [ 1136.783240] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.804855] CPU: 0 PID: 7402 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1136.812721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.822238] Call Trace: [ 1136.824827] dump_stack+0x1b2/0x281 [ 1136.828470] should_fail.cold+0x10a/0x149 [ 1136.832772] should_failslab+0xd6/0x130 [ 1136.836757] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1136.841438] ? __lock_acquire+0x5fc/0x3f20 [ 1136.845696] device_create_groups_vargs+0x7b/0x250 [ 1136.850640] device_create_vargs+0x3a/0x50 [ 1136.854868] bdi_register_va.part.0+0x35/0x650 [ 1136.859445] bdi_register+0x101/0x110 [ 1136.863257] ? bdi_register_va+0x80/0x80 [ 1136.867310] ? vsnprintf+0x260/0x1340 [ 1136.871102] bdi_register_owner+0x59/0xf0 [ 1136.875244] device_add_disk+0x5bb/0xdc0 [ 1136.879293] ? sprintf+0xa7/0xd0 [ 1136.882653] ? blk_alloc_devt+0x310/0x310 [ 1136.886797] ? __lockdep_init_map+0x100/0x560 [ 1136.891390] ? __lockdep_init_map+0x100/0x560 [ 1136.895986] loop_add+0x615/0x830 [ 1136.899545] ? loop_queue_rq+0x280/0x280 [ 1136.903600] ? loop_queue_work+0x1e80/0x1e80 [ 1136.908015] ? trace_hardirqs_on+0x10/0x10 [ 1136.912298] loop_control_ioctl+0x11a/0x3f0 [ 1136.916624] ? loop_lookup+0x190/0x190 [ 1136.920513] ? SyS_write+0x1b7/0x210 [ 1136.924227] ? loop_lookup+0x190/0x190 [ 1136.928112] do_vfs_ioctl+0x75a/0xff0 [ 1136.931915] ? ioctl_preallocate+0x1a0/0x1a0 [ 1136.936575] ? lock_downgrade+0x740/0x740 [ 1136.940721] ? __fget+0x225/0x360 [ 1136.944277] ? do_vfs_ioctl+0xff0/0xff0 [ 1136.948257] ? security_file_ioctl+0x83/0xb0 [ 1136.952872] SyS_ioctl+0x7f/0xb0 [ 1136.956240] ? do_vfs_ioctl+0xff0/0xff0 [ 1136.960910] do_syscall_64+0x1d5/0x640 [ 1136.965136] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1136.972454] RIP: 0033:0x4665f9 [ 1136.976906] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1136.984628] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1136.991913] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1136.999197] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.006472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1137.013741] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1137.037532] kasan: CONFIG_KASAN_INLINE enabled [ 1137.042414] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1137.050226] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1137.056562] Modules linked in: [ 1137.059763] CPU: 0 PID: 7402 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 [ 1137.071098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.082141] task: ffff888095a00200 task.stack: ffff88808d8a8000 [ 1137.088208] RIP: 0010:sysfs_do_create_link_sd+0x56/0x120 [ 1137.093649] RSP: 0018:ffff88808d8afb48 EFLAGS: 00010202 [ 1137.099018] RAX: dffffc0000000000 RBX: 0000000000000010 RCX: 00000000000062a7 [ 1137.106375] RDX: 0000000000000008 RSI: 0000000000000001 RDI: 0000000000000040 [ 1137.113637] RBP: ffffffff87cbae20 R08: ffffffff8b9c0ff8 R09: 00000000000400c8 [ 1137.120898] R10: ffff888095a00ab0 R11: ffff888095a00200 R12: ffff8880a569d460 [ 1137.128297] R13: ffffffff87cbae20 R14: 0000000000000001 R15: ffff8880a9d9c0dc [ 1137.135688] FS: 00007fdeeae5e700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 1137.144165] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1137.150444] CR2: 0000561a85891c88 CR3: 00000000b0b17000 CR4: 00000000001406f0 [ 1137.157806] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1137.165257] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1137.173017] Call Trace: [ 1137.175629] sysfs_create_link+0x5f/0xc0 [ 1137.179702] device_add_disk+0x9f8/0xdc0 [ 1137.183749] ? sprintf+0xa7/0xd0 [ 1137.187121] ? blk_alloc_devt+0x310/0x310 [ 1137.191272] ? __lockdep_init_map+0x100/0x560 [ 1137.195757] ? __lockdep_init_map+0x100/0x560 [ 1137.201282] loop_add+0x615/0x830 [ 1137.204736] ? loop_queue_rq+0x280/0x280 [ 1137.208787] ? loop_queue_work+0x1e80/0x1e80 [ 1137.213277] ? trace_hardirqs_on+0x10/0x10 [ 1137.217522] loop_control_ioctl+0x11a/0x3f0 [ 1137.221849] ? loop_lookup+0x190/0x190 [ 1137.225933] ? SyS_write+0x1b7/0x210 [ 1137.229824] ? loop_lookup+0x190/0x190 [ 1137.233733] do_vfs_ioctl+0x75a/0xff0 [ 1137.237528] ? ioctl_preallocate+0x1a0/0x1a0 [ 1137.241932] ? lock_downgrade+0x740/0x740 [ 1137.246919] ? __fget+0x225/0x360 [ 1137.250894] ? do_vfs_ioctl+0xff0/0xff0 [ 1137.254927] ? security_file_ioctl+0x83/0xb0 [ 1137.259326] SyS_ioctl+0x7f/0xb0 [ 1137.262770] ? do_vfs_ioctl+0xff0/0xff0 [ 1137.268131] do_syscall_64+0x1d5/0x640 [ 1137.272185] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1137.277362] RIP: 0033:0x4665f9 [ 1137.280552] RSP: 002b:00007fdeeae5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1137.288263] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1137.295539] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1137.302919] RBP: 00007fdeeae5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.310905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1137.318183] R13: 00007ffe5a1afbef R14: 00007fdeeae5e300 R15: 0000000000022000 [ 1137.325644] Code: 84 a1 00 00 00 e8 1b 81 b1 ff 48 c7 c7 40 c3 04 89 e8 cf 04 7f 05 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a7 00 00 00 4c 8b 6b 30 4d 85 ed 74 4f e8 e2 [ 1137.344848] RIP: sysfs_do_create_link_sd+0x56/0x120 RSP: ffff88808d8afb48 [ 1137.352135] ---[ end trace dc38a6dc41ef7aa3 ]--- [ 1137.356945] Kernel panic - not syncing: Fatal exception [ 1137.362866] Kernel Offset: disabled [ 1137.366604] Rebooting in 86400 seconds..