[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.269087] kauditd_printk_skb: 7 callbacks suppressed [ 26.269099] audit: type=1800 audit(1539751266.745:29): pid=5452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.303400] audit: type=1800 audit(1539751266.745:30): pid=5452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. 2018/10/17 04:41:30 fuzzer started 2018/10/17 04:41:32 dialing manager at 10.128.0.26:33409 2018/10/17 04:41:33 syscalls: 1 2018/10/17 04:41:33 code coverage: enabled 2018/10/17 04:41:33 comparison tracing: enabled 2018/10/17 04:41:33 setuid sandbox: enabled 2018/10/17 04:41:33 namespace sandbox: enabled 2018/10/17 04:41:33 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/17 04:41:33 fault injection: enabled 2018/10/17 04:41:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/17 04:41:33 net packed injection: enabled 2018/10/17 04:41:33 net device setup: enabled 04:44:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f000089b000)}, 0x18) syzkaller login: [ 259.481340] IPVS: ftp: loaded support on port[0] = 21 04:45:00 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000100)=""/114, 0x72, 0x100, 0x0, 0x0) sendmmsg(r0, &(0x7f0000004e00)=[{{&(0x7f00000002c0)=@ipx={0x4, 0x0, 0x0, "90d1e4ffbee1"}, 0x80, &(0x7f0000003bc0), 0x0, &(0x7f0000003c40)}}], 0x300, 0x0) [ 259.759470] IPVS: ftp: loaded support on port[0] = 21 04:45:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000c258"], 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0xd1) [ 260.182915] IPVS: ftp: loaded support on port[0] = 21 04:45:00 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000240)) [ 260.620037] IPVS: ftp: loaded support on port[0] = 21 [ 260.909962] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.931117] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.950899] device bridge_slave_0 entered promiscuous mode 04:45:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791000000000000000000000000000009500000000000000c69ae199a9f06123ee"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 261.115699] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.131323] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.151167] device bridge_slave_1 entered promiscuous mode [ 261.288699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.295783] IPVS: ftp: loaded support on port[0] = 21 [ 261.459308] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.481763] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.490985] device bridge_slave_0 entered promiscuous mode [ 261.513098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.689147] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.702922] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.710393] device bridge_slave_1 entered promiscuous mode 04:45:02 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/142, 0x8e}], 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001040)=""/4096, 0x1000}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) [ 261.880873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.942071] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 261.985852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.072206] IPVS: ftp: loaded support on port[0] = 21 [ 262.091455] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.453408] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.459834] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.470006] device bridge_slave_0 entered promiscuous mode [ 262.494222] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.632965] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.642390] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.650396] device bridge_slave_1 entered promiscuous mode [ 262.676863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.694774] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 262.716490] team0: Port device team_slave_0 added [ 262.754415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 262.781519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.822789] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.898724] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.907954] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.920363] device bridge_slave_0 entered promiscuous mode [ 262.932088] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 262.941454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.958056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.972501] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 262.980051] team0: Port device team_slave_1 added [ 263.064166] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.070648] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.078669] device bridge_slave_1 entered promiscuous mode [ 263.121193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.240361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.273186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 263.332859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 263.340404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.361537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.383586] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.433035] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.452762] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 263.467648] team0: Port device team_slave_0 added [ 263.501053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 263.508197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.517280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.548335] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.608209] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 263.641239] team0: Port device team_slave_1 added [ 263.722219] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.728775] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.750358] device bridge_slave_0 entered promiscuous mode [ 263.760478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 263.786547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 263.801457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.831770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.848157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.865856] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.911173] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.917565] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.930343] device bridge_slave_1 entered promiscuous mode [ 263.942868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 263.950129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 263.968135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.984687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.011555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 264.023613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.101328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 264.116225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 264.162277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.170486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.211335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 264.263282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 264.270471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.284071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.384261] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.403917] team0: Port device team_slave_0 added [ 264.460331] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.490874] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.498346] device bridge_slave_0 entered promiscuous mode [ 264.544234] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.571640] team0: Port device team_slave_1 added [ 264.580446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.625648] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.650842] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.671959] device bridge_slave_1 entered promiscuous mode [ 264.696544] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 264.728580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.739742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.779479] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.792194] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.799658] team0: Port device team_slave_0 added [ 264.807578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 264.822259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 264.836991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 264.845229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.884653] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.912795] team0: Port device team_slave_1 added [ 264.931026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 264.938742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 264.966216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 264.985410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.996891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.022990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 265.032142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.038977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.051933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.112998] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.120138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.136667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.172259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.280491] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.287058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.294173] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.300548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.321262] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 265.339708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.357159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.365741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.441899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.483366] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.490532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.501528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.553350] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 265.584237] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 265.594225] team0: Port device team_slave_0 added [ 265.727163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.738008] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.749393] team0: Port device team_slave_1 added [ 265.839236] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 265.866181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.891456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.898425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.910380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.945827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 265.992616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.012886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 266.026896] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.033333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.039993] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.046429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.069203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.075713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.092468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.202094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.209282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.221557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.347858] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.357160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.367967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.397238] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 266.431985] team0: Port device team_slave_0 added [ 266.451543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.543589] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 266.568108] team0: Port device team_slave_1 added [ 266.728156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 266.751287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.759207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.806105] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.812579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.819277] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.825711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.846767] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.864200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 266.880200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.896182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.031102] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.038276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.050835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.221118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.228292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.238567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.370701] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.377275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.384037] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.390444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.407558] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 267.461174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.468958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.818278] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.824740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.831506] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.837900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.849640] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.530876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.753569] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.760019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.766744] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.773161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.810176] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 269.581805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.934198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.452060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.469902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.912628] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.004529] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.010861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.017952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.244935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.424177] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.430408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.461533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.541070] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.681988] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.731871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.879279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.969124] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.182246] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.188442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.196964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.266964] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.338485] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.637990] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.711993] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.718184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.731868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.773233] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.789354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.798688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.225606] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.246267] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.262336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.747712] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.233168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.239398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.247096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:45:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netfilter\x00') r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstat(r0, &(0x7f0000003640)) 04:45:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f000063a000)=0x3bd, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = socket(0x11, 0x40000000000003, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") [ 275.784103] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.843132] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:45:16 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x4}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000300)={0x300}, 0x2) [ 276.279893] misc userio: Begin command sent, but we're already running 04:45:16 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000340)) r1 = socket$inet6(0xa, 0x80003, 0x1) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000280)=0x10) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000003c0)) fchdir(r3) getdents64(r3, &(0x7f0000000200)=""/116, 0x184) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'veth1_to_bond\x00'}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getpid() quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000480)) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000004c0)={[{0x1, 0x3, 0x0, 0x5, 0x7fffffff, 0x4, 0x0, 0x0, 0x1d600, 0x8, 0x0, 0x8001, 0x9}, {0x8, 0x0, 0x7, 0xff, 0x0, 0x1f, 0x8000, 0x5, 0x200, 0x0, 0x9, 0x7, 0x6911}, {0x4, 0x6, 0x0, 0x0, 0x7db0, 0x7ff, 0x5, 0x7, 0x7, 0xab5, 0xa0, 0x1, 0x1}], 0x8}) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000002c0)={0x2, 0x0, [{0x0, 0x9f8, 0x800, 0x5, 0xe244}, {0x80000007, 0x7f, 0x80, 0x2, 0x3}]}) ioctl$KVM_SET_PIT(r0, 0xc048ae65, &(0x7f0000000400)) [ 276.482692] hrtimer: interrupt took 32560 ns 04:45:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x4170000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 276.724020] audit: type=1804 audit(1539751517.205:31): pid=7130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir296502171/syzkaller.T7O2us/0/file0/file0" dev="sda1" ino=16525 res=1 [ 276.868198] audit: type=1804 audit(1539751517.205:32): pid=7130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir296502171/syzkaller.T7O2us/0/file0/file0" dev="sda1" ino=16525 res=1 04:45:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000580)='security.ima\x00', &(0x7f00000005c0)=@ng, 0x2, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000400)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, &(0x7f00000008c0)='\x00') 04:45:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='ns\x00') fcntl$notify(r0, 0x402, 0x8000000b) exit(0x0) getdents64(r0, &(0x7f0000000300)=""/57, 0x91d10df06a1683a4) 04:45:17 executing program 2: setuid(0xffffffffffffffff) r0 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)=""/144) 04:45:17 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{}, {}, {}, {}]}, 0x138) [ 277.345532] kernel msg: ebtables bug: please report to author: Hook order must be followed 04:45:17 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x6, 0x4, 0x1e03, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 04:45:19 executing program 5: clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=""/23, &(0x7f00000001c0)=0x17) 04:45:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x40001) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) connect$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_netdev_private(r1, 0x0, &(0x7f0000000340)) 04:45:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7a, 0x0, [0x4b564d01]}) 04:45:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)="6370755b6363742e73746100003c3267f62f879fbaea3f2a815eda37b450adfc3b6abe3bddcff27f4bdac2e8462b3dce39f026487fda503fbba1b6185fd05f9b67f0c9abba33decc974bcaff59f2aa1e8e63eafaef2e5632541a1080dccd7c67164197d5444c04dd7fcd164a43a8c242b1755b0636789da0135835bf224698ff02c4ddcfed4031b0178912a37446dc2c6edd86aee827428f58e1136c42987eebb0efc6d257f0a978e28d5878a9f74d6d52a69f986251baf0c4b4652350b0", 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x40086607, &(0x7f0000000000)) [ 278.616758] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 278.626775] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 278.664236] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 04:45:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x2000000000000001) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000100)={0x7, 0x0, 'client1\x00', 0x0, "fdcf8df2bbdc2a67", "e6887ba4a0fc234575eef3626e606161e36a7a1c7d5f9d0e093d7ff2e1f4355f", 0x2}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='children\x00') accept4$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) 04:45:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000140)={[{@ikeep='ikeep'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:45:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de5903b966f489d7133945a385d9cc56a07aad73ab0000000000005b540745df4b1dee483b157624c5bc719a099e6a35ec5d650b68315b6163d291cc4e418e76fa5121aa", 0x2761, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000580)='security.ima\x00', &(0x7f00000005c0)=@ng, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7fff, 0x80}) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000400)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, &(0x7f00000008c0)='\x00') accept(0xffffffffffffffff, &(0x7f0000000680)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000700)=0x80) [ 278.829486] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 278.857380] FAT-fs (loop1): Filesystem has been set read-only 04:45:19 executing program 4: pipe(&(0x7f0000000040)) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="220000001800050000000000000007100200fd100a660009000effef00000f80ff00", 0x22) 04:45:19 executing program 0: 04:45:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 279.092956] XFS (loop2): Invalid superblock magic number 04:45:20 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = dup(0xffffffffffffffff) inotify_init() socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup(r0) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) flistxattr(r1, &(0x7f00000008c0)=""/249, 0xf9) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r4 = syz_open_procfs(r3, &(0x7f0000000680)='uid_map\x00') r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) ioctl$TCXONC(r4, 0x540a, 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) ioctl$LOOP_SET_FD(r5, 0x4c00, r6) 04:45:20 executing program 4: 04:45:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff000000000100"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46e543b5c408d84c37ac00f29b52e5bc", 0x24, 0x7}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:23 executing program 3: 04:45:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe38) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000580)='security.ima\x00', &(0x7f00000005c0)=@ng={0x4, 0x12}, 0x2, 0x6579bd202dcf8448) lsetxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='.request_key_auth\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000980)="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", 0xf7a, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000380)={0x0, 0x5, 0x3, 0x0, 0x80}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x4000001) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000400)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) set_tid_address(&(0x7f0000000480)) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, &(0x7f00000008c0)='\x00') accept(0xffffffffffffffff, &(0x7f0000000680)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000700)=0x80) socketpair(0x6, 0x0, 0x0, &(0x7f00000000c0)) 04:45:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000400)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000003c0)) 04:45:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff000000000100"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46e543b5c408d84c37ac00f29b52e5bc", 0x24, 0x7}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff000000000100"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46e543b5c408d84c37ac00f29b52e5bc", 0x24, 0x7}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:23 executing program 3: 04:45:23 executing program 4: [ 282.707487] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) 04:45:23 executing program 2: [ 282.749830] ntfs: (device loop0): parse_options(): Unrecognized mount option rootcontext. [ 282.774732] FAT-fs (loop1): Filesystem has been set read-only 04:45:23 executing program 4: [ 282.811718] ntfs: (device loop0): parse_options(): Unrecognized mount option fscontext. 04:45:23 executing program 3: 04:45:23 executing program 2: [ 282.897604] ntfs: (device loop0): parse_options(): Unrecognized mount option dont_appraise. 04:45:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:23 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff000000000100"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46e543b5c408d84c37ac00f29b52e5bc", 0x24, 0x7}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:23 executing program 4: 04:45:23 executing program 3: [ 282.979644] ntfs: (device loop0): parse_options(): Unrecognized mount option uid<18446744073709551615. 04:45:23 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0xfffffec3) ioctl$int_in(r0, 0x80000000005001, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000007800)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007840)={'ip_vti0\x00', r1}) socket$inet6_udplite(0xa, 0x2, 0x88) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) 04:45:23 executing program 2: 04:45:23 executing program 4: 04:45:23 executing program 3: 04:45:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 283.285109] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000203) 04:45:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x2e8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000c000, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0xb0010000]}, 0x10) 04:45:23 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x3) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x40000004, 0x0, 0x14}, 0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffff638, 0x0}, &(0x7f00000001c0)=0x10) semget$private(0x0, 0x0, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000240)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f00000004c0)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000006c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x8}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000005c0)={r3, @in={{0x2, 0x4e22, @rand_addr=0x47d}}, 0x3, 0xe7, 0xa96a, 0x7fff, 0x40}, 0x98) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0x8) 04:45:23 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000001300)=ANY=[]}, 0x0) r0 = socket$inet(0x2, 0x3, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x8000000000000053, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) [ 283.349067] FAT-fs (loop5): Filesystem has been set read-only 04:45:24 executing program 3: 04:45:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff000000000100"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46e543b5c408d84c37ac00f29b52e5bc", 0x24, 0x7}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:24 executing program 3: 04:45:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3f, 0x1, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) memfd_create(&(0x7f00000000c0)='user/\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000950000)}, 0x20) 04:45:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 04:45:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:24 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001e40)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 04:45:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], 0x1}}, 0x0) 04:45:24 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0x0, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00), 0x0, 0x7}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x3, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x1d, 0x1, 0x0, 0x0, {0xffffff1f}}, 0x14}}, 0x0) 04:45:24 executing program 2: 04:45:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:24 executing program 0: 04:45:24 executing program 0: 04:45:24 executing program 2: 04:45:24 executing program 3: 04:45:25 executing program 5: 04:45:25 executing program 3: 04:45:25 executing program 0: 04:45:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:25 executing program 4: 04:45:25 executing program 2: 04:45:25 executing program 5: 04:45:25 executing program 0: 04:45:25 executing program 2: 04:45:25 executing program 3: 04:45:25 executing program 4: 04:45:25 executing program 0: 04:45:25 executing program 5: 04:45:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:25 executing program 3: 04:45:25 executing program 2: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x1, &(0x7f00000002c0), 0x0) 04:45:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x0, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x0) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x0, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:25 executing program 4: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(0xffffffffffffffff, 0x1, 0x0, 0x5) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000100)=""/9, &(0x7f0000000180)=0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xc0ffffff00000000, {0x0, 0x0, 0x15}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) r4 = dup2(r2, r1) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 04:45:25 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, &(0x7f0000b58000), 0xffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') [ 285.016770] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 285.071741] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 04:45:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x1c, 0x29, 0x82d, 0x0, 0x0, {0x1}, [@generic="ededdf0c05"]}, 0x1c}}, 0x0) 04:45:25 executing program 0: 04:45:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:25 executing program 2: 04:45:25 executing program 3: [ 285.338141] dccp_close: ABORT with 18 bytes unread [ 285.341922] minix_free_inode: bit 1 already cleared 04:45:25 executing program 2: 04:45:25 executing program 5: 04:45:25 executing program 0: 04:45:25 executing program 4: 04:45:26 executing program 3: 04:45:26 executing program 4: 04:45:26 executing program 0: 04:45:26 executing program 2: 04:45:26 executing program 5: 04:45:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r2, &(0x7f00000002c0)=ANY=[], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xf, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 04:45:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000061c0)={'bridge_slave_0\x00'}) 04:45:26 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000440)="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", 0x0) syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000005c0)}}, 0x18) 04:45:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000100)="2e650f983df3cf0f01751a6a000f320fae29670f01ca0f01dfbaf80c66b8114eeb8266efbafc0cec0f01c8", 0x2b}], 0x1, 0x0, &(0x7f0000000080), 0x0) 04:45:26 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000140)=0x7, 0x5) 04:45:26 executing program 3: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) [ 286.011223] minix_free_inode: bit 1 already cleared 04:45:26 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000c80)=""/4096) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) r1 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000c2581d"], 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0xd1) [ 286.095727] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 04:45:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:26 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:26 executing program 3: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 286.183280] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 [ 286.264861] overlayfs: failed to resolve './file1': -2 [ 286.271483] minix_free_inode: bit 1 already cleared [ 286.511995] overlayfs: './file0' not a directory [ 286.544140] audit: type=1804 audit(1539751527.025:33): pid=7642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir491675811/syzkaller.BReWAf/15/file0/file0" dev="sda1" ino=16567 res=1 [ 286.577287] ntfs: (device loop5): parse_options(): Unrecognized mount option Ñ. [ 286.611215] minix_free_inode: bit 1 already cleared [ 286.645165] audit: type=1804 audit(1539751527.025:34): pid=7642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir491675811/syzkaller.BReWAf/15/file0/file0" dev="sda1" ino=16567 res=1 [ 286.649636] bridge0: port 1(bridge_slave_0) entered disabled state 04:45:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={&(0x7f000034c000), 0xc, &(0x7f00000daff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) [ 286.711939] minix_free_inode: bit 1 already cleared 04:45:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r2, &(0x7f00000002c0), 0x20) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xf, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 04:45:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:27 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448d4, &(0x7f0000000640)) 04:45:27 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:27 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x4000000000b, &(0x7f0000000340)=0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) io_submit(r1, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000587000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f000096f000)="060063efff7f00009d", 0x9}]) 04:45:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200), 0x10, &(0x7f0000000240)={&(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "9e87345f85c3e714"}}, 0x48}}, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) recvmmsg(r1, &(0x7f00000003c0)=[{{&(0x7f0000000340)=@ll, 0xfb, &(0x7f00000019c0)=[{&(0x7f00000004c0)=""/51}, {&(0x7f0000000500)=""/177}, {&(0x7f0000000600)=""/199}, {&(0x7f0000000700)=""/16}, {&(0x7f0000000740)=""/232}, {&(0x7f0000000840)=""/193}, {&(0x7f0000000940)=""/4096}, {&(0x7f0000001940)=""/113}], 0xfb, &(0x7f0000000440)=""/106, 0x6a}}], 0x2c, 0x0, &(0x7f0000000400)={0x77359400}) 04:45:27 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:27 executing program 2: 04:45:27 executing program 5: [ 287.021208] minix_free_inode: bit 1 already cleared 04:45:27 executing program 2: 04:45:27 executing program 5: 04:45:27 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:27 executing program 4: [ 287.321510] minix_free_inode: bit 1 already cleared [ 287.792106] device bridge_slave_1 left promiscuous mode [ 287.798217] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.857355] device bridge_slave_0 left promiscuous mode [ 287.863517] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.957965] team0 (unregistering): Port device team_slave_1 removed [ 287.977700] team0 (unregistering): Port device team_slave_0 removed [ 287.995774] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 288.079114] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 288.162091] bond0 (unregistering): Released all slaves [ 289.218288] IPVS: ftp: loaded support on port[0] = 21 [ 289.660970] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.667429] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.674735] device bridge_slave_0 entered promiscuous mode [ 289.703727] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.710179] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.718114] device bridge_slave_1 entered promiscuous mode [ 289.746478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 289.775440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 289.856163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.887954] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 290.007974] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 290.015268] team0: Port device team_slave_0 added [ 290.041296] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 290.048601] team0: Port device team_slave_1 added [ 290.074773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.103842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.132769] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 290.139807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.148788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.171840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 290.178879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.187694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.440926] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.447307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.454057] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.460413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.467984] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 290.790929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.407537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.498154] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 291.588248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 291.594794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.602537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.693875] 8021q: adding VLAN 0 to HW filter on device team0 04:45:32 executing program 3: syz_mount_image$xfs(&(0x7f00000003c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='hfs\x00', 0x0, 0x0) 04:45:32 executing program 5: 04:45:32 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:32 executing program 2: 04:45:32 executing program 4: 04:45:32 executing program 0: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstat(r0, &(0x7f0000003640)) 04:45:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_read_part_table(0xc7c, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 292.325146] minix_free_inode: bit 1 already cleared 04:45:32 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000040)={'sit0\x00', @ifru_mtu}) 04:45:32 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 292.433115] hfs: can't find a HFS filesystem on dev md0 [ 292.472910] loop2: p1 [ 292.475863] loop2: partition table partially beyond EOD, truncated 04:45:33 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r2, &(0x7f00000002c0)=ANY=[], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 292.502713] loop2: p1 size 2047 extends beyond EOD, truncated [ 292.524104] XFS (loop3): Invalid superblock magic number [ 292.617559] MINIX-fs: bad superblock or unable to read bitmaps [ 292.652781] loop2: p1 [ 292.655540] loop2: partition table partially beyond EOD, truncated [ 292.677511] loop2: p1 size 2047 extends beyond EOD, truncated [ 292.684575] hfs: can't find a HFS filesystem on dev md0 04:45:33 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) shutdown(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x4) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 04:45:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000001140)={0x1, 0xc1a, 0xffff, 0xff}) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000080), 0x2) write$UHID_INPUT(r2, &(0x7f0000000100)={0x8, "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", 0x1000}, 0x1006) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000001180), &(0x7f00000011c0)=0x4) 04:45:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = semget$private(0x0, 0x20000000102, 0x0) semop(r1, &(0x7f0000000280)=[{0x0, 0x8}, {0x4, 0x0, 0xfffffffffffffffd}, {}], 0x3) tee(r0, r0, 0x3, 0x4) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/124, 0x7c) semop(r1, &(0x7f0000000100)=[{0x0, 0xfffffffffffefffc}], 0x1) semop(r1, &(0x7f0000001480)=[{0x0, 0x200005}], 0x1) 04:45:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xc2d41, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000380)=""/4096) getgroups(0x6, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0]) setgid(r1) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x3f, 0x9, 0x0, 0x7, 0xffffffff, 0x5, 0x20, 0xff, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000200)={r4, 0xe5f7}, &(0x7f0000000240)=0x8) 04:45:33 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000240), 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 292.912590] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 292.932006] print_req_error: I/O error, dev loop2, sector 1 [ 292.968412] print_req_error: I/O error, dev loop2, sector 1 [ 292.974817] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 292.983039] print_req_error: I/O error, dev loop2, sector 2 [ 292.988858] Buffer I/O error on dev loop2p1, logical block 1, async page read [ 293.002593] print_req_error: I/O error, dev loop2, sector 3 [ 293.008421] Buffer I/O error on dev loop2p1, logical block 2, async page read 04:45:33 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 293.016942] print_req_error: I/O error, dev loop2, sector 4 [ 293.022820] Buffer I/O error on dev loop2p1, logical block 3, async page read [ 293.030824] print_req_error: I/O error, dev loop2, sector 5 [ 293.036639] Buffer I/O error on dev loop2p1, logical block 4, async page read [ 293.044650] print_req_error: I/O error, dev loop2, sector 1 [ 293.050462] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 293.059765] print_req_error: I/O error, dev loop2, sector 2 04:45:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:33 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x189) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000500)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000004c0), r0, 0x2, 0xffffff1f, 0x4}}, 0x20) r1 = memfd_create(&(0x7f0000000000)='{trustedem1lo/^vboxnet1vboxnet1\x00', 0x4) write$binfmt_misc(r1, &(0x7f0000000100)={'syz0', "09f57f1c8c6ced9cffcb62bae8215a03"}, 0x14) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) [ 293.065629] Buffer I/O error on dev loop2p1, logical block 1, async page read [ 293.074527] print_req_error: I/O error, dev loop2, sector 3 [ 293.080358] Buffer I/O error on dev loop2p1, logical block 2, async page read [ 293.088721] print_req_error: I/O error, dev loop2, sector 4 [ 293.095677] Buffer I/O error on dev loop2p1, logical block 3, async page read [ 293.103678] Buffer I/O error on dev loop2p1, logical block 4, async page read 04:45:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = getpid() getpriority(0x0, r2) [ 293.189023] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 04:45:33 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180), 0x0, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x8, 0x4) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200100, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x8200, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000080)={0x3, r2}) socket(0x2, 0x80000, 0x5) fcntl$setlease(r0, 0x400, 0x1) fanotify_mark(r2, 0x4, 0x8000018, r2, &(0x7f0000000040)='./file0\x00') 04:45:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x102d, [0x20000200, 0x0, 0x0, 0x20000230, 0x200015f0], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}, 0x10a5) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0xfffffffffffffffe, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x800000000000000, 0xffffffffffffff01, @tick, {}, {0x0, 0xffffffffffffffff}, @time}], 0x30) 04:45:33 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:33 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffffffffffffa2a8, 0x20000) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000200)=0x10001, 0xfffffffffffffed1) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x10001, 0x4) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001780)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, &(0x7f00000015c0)}, &(0x7f0000001640)='\x00\x00\x00\x00\x00\x00', &(0x7f0000000380), 0x1, 0x0, 0x3, &(0x7f0000001740)}) [ 293.479971] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 293.643843] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 04:45:34 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x8, @mcast2, 0x51c48000000}}, 0x0, 0x1}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r1, 0x6}, 0x8) getpid() connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000003c0)={'ip6tnl0\x00', {0x2, 0x0, @loopback}}) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="0094930000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000180)=0x14) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r3, 0x0) 04:45:34 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)=0x3) sendmsg(r1, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x99, 0x7, 0x7, 0x0, 0x2000000000}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=[{0x78, 0x0, 0x8000, "97bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2935e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e86885587098bbb4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b"}], 0x78}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='team0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x20082, 0xb, 0x200000080}, 0x45) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r2, 0x28, &(0x7f0000000400)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) read(r2, &(0x7f0000000d40)=""/133, 0x85) recvmsg$kcm(r1, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x2, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0x6, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) sendmsg(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000000d40), 0x0, 0x400c011}, 0x80) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000ac0)={0x76, &(0x7f0000000b80)=""/118}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) socketpair$inet6(0xa, 0x7, 0x5, &(0x7f0000000140)) name_to_handle_at(r1, &(0x7f0000000c40)='./file0\x00', &(0x7f0000000e00)={0x49, 0x7, "78e9a0d7b7a94bb277148046ab58a1a1ffa980406dadd4384303ac925a4d774a2fa11de378f3824175098ff83fe87f50761fa2017acf0e838f35f4d68507fad212"}, &(0x7f0000000f00), 0x1400) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) 04:45:34 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad5", 0xa, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:34 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80, 0x700}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106, 0x0, @local, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000040)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x260400, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x6, 0x2, 0x9}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40c040, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 04:45:34 executing program 4: r0 = socket(0x10, 0x4, 0x4000000c) write(r0, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000594000), 0x0) close(r1) 04:45:34 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 293.931822] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 04:45:34 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="1020f5f201000700090000000300000abd94716190e32600eeff00000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002ad9711bc552e963db432", 0x7b, 0x1400}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="55d33fd11ad91bf55e9818"]) 04:45:34 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000580)=""/181, &(0x7f0000000440)=""/141}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001900)=ANY=[]) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x90) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x50080, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000200)={r2, 0x1, 0x9, "54d8e022a9b256527044810a7ea885cccb180ed35140aab9669b48424d83a4ea95fb18e145348258f168d86991ef93dfd3329e7dd74e313891f79ca1956e74ecf5eb45559b99433ad33c3f835e84924e230dbeb9b4ad9c8499fcf2bdd70162658bf1c19171a3cb1a88e9e9ed265f1a63d6a2ca95cce096be9b270ca6828dbcd80df28ae48d355cd87369bb28b340f4a68933742fd83a5524913a8b3394d1"}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000700)=""/236, &(0x7f0000000540)=""/57, &(0x7f0000000040)=""/70}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) [ 293.997282] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 294.011419] FAT-fs (loop1): Filesystem has been set read-only 04:45:34 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44", 0xf, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:34 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000440)={{0xfffffffffffffffe, 0x2}, 'port0\x00', 0x22, 0x20, 0x7fffffff, 0x7, 0x0, 0x8001, 0x8c, 0x0, 0x6, 0x7f}) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) clock_getres(0x0, &(0x7f0000000000)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4188aea7, &(0x7f0000000040)={0x2, 0x0, [0x4b564d03, 0x0, 0x40000100]}) [ 294.210543] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 294.246563] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 04:45:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 294.270944] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 294.303268] F2FS-fs (loop3): Invalid blocksize (536870912), supports only 4KB [ 294.303268] [ 294.376699] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 294.411607] QAT: Invalid ioctl [ 294.413775] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 294.430505] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 294.461268] FAT-fs (loop1): Filesystem has been set read-only [ 294.467372] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 294.509103] F2FS-fs (loop3): Invalid blocksize (536870912), supports only 4KB [ 294.509103] [ 294.568246] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 294.642124] QAT: Invalid ioctl [ 294.741423] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 294.763058] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 294.784959] F2FS-fs (loop3): Invalid blocksize (536870912), supports only 4KB [ 294.784959] [ 294.794256] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 294.802709] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 294.820534] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 294.829225] F2FS-fs (loop3): Invalid blocksize (536870912), supports only 4KB [ 294.829225] [ 294.838678] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 04:45:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:35 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000200)='./file0\x00', 0x80000005) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 04:45:35 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f", 0x11, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) prctl$setptracer(0x59616d61, r1) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r4, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) epoll_pwait(r3, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) dup3(r4, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000021ff4)={0x2001}) 04:45:35 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380), 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) writev(r0, &(0x7f00000006c0)=[{&(0x7f00000001c0)="c4", 0x1}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0xb3, "a2dc957f9ae8fc418730d04ed1e4495178cb2898ff00a1a07b44a9a3621f57c2085514b984936da4a266f0d287e36f67b7b3f78393fecfbef5c4f90160d42c1b168a10e03073edf9835d69df7ed68081c8ab95c0dc0e94828d26ba38ebbb6a63ce055f9fcf2a4c236943e4da26fd6d32f24f57ad0489e70093c6d3adc733ee6e5ac6d7c02b4bfffbef151846aad92d8856865d72759596f3fd4b2ff9eeef7019cf3c33ba62ccf5a0c298f7fde4f93eb3c8c1f9"}, &(0x7f0000000140)=0xd7) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 04:45:35 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) getrlimit(0x0, &(0x7f0000000280)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x48) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="1d5944c009fe7c81dcc7d8d495421d4f5b99b36c170b77cd5a6ee79dbc74dbf8ddb34fc399ed86ff5d558f92dfc2047615a0e9b06f16dea2b2f6782290f7eb7e3ae39ca482") r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000040)=@generic={0x3, 0x2, 0xd86}) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, &(0x7f0000000340)}) [ 295.114033] QAT: Invalid ioctl [ 295.128162] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. [ 295.162360] binder: 8234:8243 transaction failed 29201/-22, size 0-0 line 2973 [ 295.198809] QAT: Invalid ioctl 04:45:35 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 295.210208] binder: BINDER_SET_CONTEXT_MGR already set [ 295.223403] binder: 8234:8255 ioctl 40046207 0 returned -16 [ 295.238630] binder_alloc: 8234: binder_alloc_buf, no vma [ 295.245962] binder: undelivered TRANSACTION_ERROR: 29201 [ 295.267811] binder: 8234:8243 transaction failed 29189/-3, size 0-0 line 2973 [ 295.297387] binder: undelivered TRANSACTION_ERROR: 29189 04:45:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000200)=ANY=[]) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x4, 0x7ff}, {0x20, 0x4}], r0}, 0x18, 0x1) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x100020, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x2}}]}) 04:45:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6664696e666fa31bc8") setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000580), 0x4) getuid() preadv(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/232, 0xe8}, {&(0x7f00000001c0)=""/116, 0x74}, {&(0x7f0000000240)=""/82, 0x52}, {&(0x7f0000000300)=""/95, 0x5f}], 0x4, 0x0) syz_mount_image$ntfs(&(0x7f0000000400)='ntfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f00000032c0)}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='errors=continue,subj_type=/dev/sequencer2\x00,dont_measure,euid>', @ANYRESDEC=0x0, @ANYBLOB="5f150f0055c608240092"]) write$P9_RREADDIR(r0, &(0x7f0000000480)={0x8d, 0x29, 0x1, {0x9, [{{0x28, 0x2, 0x2}, 0xfec, 0x3, 0x7, './file0'}, {{0x1, 0x0, 0x4}, 0x7ca4, 0x800, 0x7, './file0'}, {{0x0, 0x2, 0x3}, 0x4b0be3cb, 0xe1, 0xd, './file0/file0'}, {{0x40, 0x1, 0x1}, 0x1, 0x8000, 0x7, './file0'}]}}, 0x8d) readv(r0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/59, 0x3b}, {&(0x7f00000005c0)=""/130, 0x82}, {&(0x7f0000000680)=""/108, 0x6c}, {&(0x7f00000003c0)=""/35, 0x23}, {&(0x7f0000000700)=""/116, 0x74}, {&(0x7f0000000780)=""/80, 0x50}], 0x6) 04:45:35 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x117, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000680), r2}}, 0x18) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000080)={0x86, 0x8}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000002c0)={0x8, [0x7, 0xe9, 0x3, 0x9, 0x100000000, 0x80000001, 0x8, 0x6cf9]}, 0x14) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140)=0x7f1, 0x4) r4 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x4, 0x40) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a01000015000037c606c90095ddffffff000000"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f00000004c0)) 04:45:35 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) getsockname(r0, &(0x7f0000006680)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006700)=0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x80000) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0xffffffff80000001, 0x500) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10) getsockopt$XDP_STATISTICS(r3, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYBLOB="06000000d2dbed004fe608ddf68cc8090ff3dbd7d059171ba6cab584e5a5e95fc403de899da9a369c1e7d579e2946e1362a57272b8ceef2c6daf9d9997498299d8bfc4b46ae2ffa540e787980d75a766ed0d85ed0882ea1136fb56335a26b16657ab216baeeeae1312f89973f4fd4564ba7aced2e38d108c890d02428bfc886a5411b2aa900dc4289098dde8a394812858e17acade709ec31a5eb66793895889dbd565dcb73a161611f406e8a1e8ffe98fcf56725e050f084ef29a56f146d155fb8b5c57fa2293932c4e1817663aa11352efe0783bf8cc455f03b3fbdf5775d02d3c367bd5835f92564a0b55b3f5ad"]) 04:45:35 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000500)=""/246) getdents(r1, &(0x7f0000000000)=""/44, 0x2c) fcntl$setlease(r1, 0x400, 0x1) ioctl$EVIOCGREP(r1, 0x8004745a, &(0x7f0000d1df52)=""/174) [ 295.592284] ntfs: (device loop2): parse_options(): Unrecognized mount option subj_type. [ 295.610056] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 04:45:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000004c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000000000100000000000000000000000000e5c73e60296a6feac95d87ed4eccda18ca74b432483dda5801de03efc591bc69a6bf4404e2d3c782393b2ba66d642340880c5823a559421ceed3c0f4a81b8cafc0d229542f289853fa6a255a238b2e309d1056becbe793268513c5a368869e18b3f79be861cb76091a418629da1f07a0374e8b4464b38f0ae033c907d406c49434a5660b84e8"], 0x14}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x4e24, 0x0, 0x4e22}, {0xffffffff}, {0x3f, 0x80}, 0x800, 0x0, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d6}, 0x0, @in=@multicast1, 0x3500, 0x2, 0x0, 0x9}}, 0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, &(0x7f0000000300)}, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', r3}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 04:45:36 executing program 3: keyctl$set_reqkey_keyring(0xe, 0x6) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80000000000000, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x75) [ 295.748573] ntfs: (device loop2): parse_options(): Unrecognized mount option subj_type. 04:45:36 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0x7ffff000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000580)="87ba8f4203d5bd38bc50508a927ce8eefc121375b8c0ee5d30f019895e104cb31d86b3235a88ade4fb89549d22833a458c1e58094d7603afe03d8697521ffb5cc62bac3c00e916a980d80b0f3deda1fb443bf3dd5052691108c80a440c8cbe892e1a88fc2235d5275803121812617921a676efa4a1d688066dc2035ecd3ea55f0b15ce0f9d931e4f44334ea14d9776e7afbf5652c6e8d6cc2b0904651e56977d8197acbea3ad460a517c5a1b345d2b662e67eed12d7fe7a934513d0c25ee105f07a8088a4964a30a7a", 0xc9) unshare(0x8000400) accept4$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000004c0)=0x1c, 0x80000) mq_open(&(0x7f00000002c0)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000500)={0x1, 0x1}, 0x2) readv(0xffffffffffffffff, &(0x7f0000001400), 0x0) readv(0xffffffffffffffff, &(0x7f0000000080), 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0xfffffffffffffffe, 0x0) pselect6(0xffffffffffffffd8, &(0x7f0000000280)={0x110000000, 0x100000001, 0x0, 0x0, 0x1, 0x7fffffff, 0x3}, &(0x7f0000000380)={0x0, 0xfffffffffffffffe, 0x8, 0x1000, 0x40, 0x1000, 0x7}, &(0x7f00000003c0)={0x5, 0x0, 0x23e5, 0xfffffffffffff801, 0x0, 0x464, 0x0, 0x371}, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440)={0xa52}, 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:45:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000001700)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) getsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f0000000140)=""/130, &(0x7f0000000200)=0x82) r2 = socket(0x11, 0x3, 0x0) setsockopt(r2, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000040)=""/82, &(0x7f00000000c0)=0x52) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x272) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000000100), 0x0, &(0x7f0000dda000), 0x0, 0x4000840}], 0x0, 0x0) 04:45:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x6}) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000080)=r0) r2 = dup(r0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000001c0)=0x54) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000140)={{0x1, 0x3, 0x100000000, 0x2, 0x4}, 0x1ff, 0x6}) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) r4 = dup2(r0, r1) write$cgroup_int(r4, &(0x7f00000000c0)=0x5, 0x12) 04:45:36 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 296.141118] minix_free_inode: bit 1 already cleared 04:45:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) ioctl$sock_ifreq(r1, 0x89b0, &(0x7f0000000500)={'gre0\x00', @ifru_names='veth0_to_bond\x00'}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) 04:45:36 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000580)=@bridge_getneigh={0x20, 0x1e, 0x601}, 0x20}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x22280, 0x0) write$P9_RMKNOD(r2, &(0x7f00000000c0)={0x14, 0x13, 0x1, {0x10, 0x3, 0x2}}, 0x14) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 04:45:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 296.334668] device lo entered promiscuous mode 04:45:36 executing program 0: mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[]) [ 296.397914] bond0: Releasing backup interface bond_slave_1 [ 296.401188] minix_free_inode: bit 1 already cleared 04:45:37 executing program 0 (fault-call:2 fault-nth:0): mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 296.597060] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000203) [ 296.631411] FAT-fs (loop1): Filesystem has been set read-only 04:45:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r1}, 0xc) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'ip_vti0\x00', @dev={[], 0x18}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x200, 0x80000) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000340)=""/146) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000440)={@loopback}, &(0x7f0000000400)=0x4) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) [ 296.688615] minix_free_inode: bit 1 already cleared 04:45:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r2, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) socketpair(0xb, 0xf, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f00000000c0)={0x1, 0x6}) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x800) sendto$inet(r0, &(0x7f00000002c0)="20d6dac772b6f65cc7c3fc9bf8d917fbd5bd28cd6ad9243ec3c3fc41fe4295b32b630b3e888a8d0eb1abd9d081c0c6655507c293ed17dcc8e25f2cb85d0e732ff34d9f574cdd31597a5e3a688fff4a8f31474711e4b8f7ab05068770f885c03286fadc1d0fd02098bd981aaf152f2da86443cc605a5cb9a63475b63d354cb1f158bd", 0x82, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000580)="89", 0x1, 0x0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="da"], 0x1) 04:45:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r4]) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 296.940404] FAULT_INJECTION: forcing a failure. [ 296.940404] name failslab, interval 1, probability 0, space 0, times 1 [ 297.007636] CPU: 1 PID: 8393 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 297.016183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.025567] Call Trace: [ 297.028283] dump_stack+0x244/0x39d [ 297.032005] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.037280] ? get_pid_task+0xd6/0x1a0 [ 297.041270] should_fail.cold.4+0xa/0x17 [ 297.045378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.050550] ? __f_unlock_pos+0x19/0x20 [ 297.054573] ? lock_downgrade+0x900/0x900 [ 297.058791] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.064384] ? proc_fail_nth_write+0x9e/0x210 [ 297.068895] ? proc_cwd_link+0x1d0/0x1d0 [ 297.072981] ? find_held_lock+0x36/0x1c0 [ 297.077106] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.082577] ? __lock_is_held+0xb5/0x140 [ 297.086693] __should_failslab+0x124/0x180 [ 297.091015] should_failslab+0x9/0x14 [ 297.094876] __kmalloc_track_caller+0x2d1/0x760 [ 297.099567] ? strncpy_from_user+0x5a0/0x5a0 [ 297.103991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.109583] ? strndup_user+0x77/0xd0 [ 297.113424] memdup_user+0x2c/0xa0 [ 297.116982] strndup_user+0x77/0xd0 [ 297.120635] ksys_mount+0x3c/0x140 [ 297.124199] __x64_sys_mount+0xbe/0x150 [ 297.128220] do_syscall_64+0x1b9/0x820 [ 297.132197] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.137586] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.142578] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.147614] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.152696] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 297.159387] ? __switch_to_asm+0x40/0x70 [ 297.163462] ? __switch_to_asm+0x34/0x70 [ 297.167547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.172418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.177645] RIP: 0033:0x457569 [ 297.180862] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.199776] RSP: 002b:00007f982e7f3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.207499] RAX: ffffffffffffffda RBX: 00007f982e7f3c90 RCX: 0000000000457569 [ 297.214779] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 297.222059] RBP: 000000000072bfa0 R08: 0000000020000300 R09: 0000000000000000 [ 297.229359] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e7f46d4 [ 297.236639] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000004 04:45:37 executing program 0 (fault-call:2 fault-nth:1): mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 297.406373] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000203) [ 297.414555] minix_free_inode: bit 1 already cleared [ 297.436106] FAT-fs (loop4): Filesystem has been set read-only [ 297.531726] FAULT_INJECTION: forcing a failure. [ 297.531726] name failslab, interval 1, probability 0, space 0, times 0 [ 297.591846] CPU: 0 PID: 8423 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 297.600360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.609844] Call Trace: [ 297.612469] dump_stack+0x244/0x39d [ 297.616136] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.621389] ? __kernel_text_address+0xd/0x40 [ 297.625988] ? unwind_get_return_address+0x61/0xa0 [ 297.630960] should_fail.cold.4+0xa/0x17 [ 297.635050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.640189] ? kasan_kmalloc+0xc7/0xe0 [ 297.644098] ? __kmalloc_track_caller+0x157/0x760 [ 297.649007] ? memdup_user+0x2c/0xa0 [ 297.652750] ? zap_class+0x640/0x640 [ 297.656490] ? do_syscall_64+0x1b9/0x820 [ 297.660584] ? proc_fail_nth_write+0x9e/0x210 [ 297.665111] ? proc_cwd_link+0x1d0/0x1d0 [ 297.669211] ? find_held_lock+0x36/0x1c0 [ 297.673404] ? setup_conf.cold.75+0xe0/0x3bd [ 297.677857] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.683354] ? lock_release+0xa10/0xa10 [ 297.687379] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.692893] ? usercopy_warn+0x110/0x110 [ 297.696998] __should_failslab+0x124/0x180 [ 297.701257] should_failslab+0x9/0x14 [ 297.705078] kmem_cache_alloc_trace+0x2d7/0x750 [ 297.709776] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.715402] ? _copy_from_user+0xdf/0x150 [ 297.719588] copy_mount_options+0x5f/0x430 [ 297.723847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.729427] ksys_mount+0xd0/0x140 [ 297.733015] __x64_sys_mount+0xbe/0x150 [ 297.737022] do_syscall_64+0x1b9/0x820 [ 297.740935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.746355] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.751342] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.756388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.761433] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 297.768117] ? __switch_to_asm+0x40/0x70 [ 297.772194] ? __switch_to_asm+0x34/0x70 [ 297.776281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.781183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.786397] RIP: 0033:0x457569 [ 297.789611] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.808531] RSP: 002b:00007f982e7f3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.816780] RAX: ffffffffffffffda RBX: 00007f982e7f3c90 RCX: 0000000000457569 [ 297.824068] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 297.831374] RBP: 000000000072bfa0 R08: 0000000020000300 R09: 0000000000000000 [ 297.838657] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e7f46d4 [ 297.845945] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000005 [ 297.870466] device lo left promiscuous mode 04:45:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141040, 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLINK(r2, &(0x7f0000000200)={0x7, 0x47, 0x2}, 0x310) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$inet(r3, &(0x7f0000000300)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) sendfile(r2, r2, &(0x7f00000000c0), 0x8080fffffffe) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000002c0)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x9, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r4, 0x0, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x20000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) 04:45:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) listen(0xffffffffffffffff, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r2, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x181100, 0x0) sendmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x9, 0x1, "8bd605df78948be42bdd86ca055940182573c3166a8e36a86e740c94ed2565f321a6613a7d3d78a1cdc1ef58b32075bd17ac90335dcaee097cc0d978b82abc", 0x2d}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="9455d2a99a02a5d69037a155dec49f11984e4b214fa15612498c9a04e203d69f392085697cd40b02592ce03cc01875c2bb915607708678a94137f80c84d160644324", 0x42}, {&(0x7f0000000440)="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", 0x1000}], 0x2, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x678, 0x10}, 0x48000) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000400)=0x3, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x30c80, 0x0) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socketpair$inet6(0xa, 0x80007, 0x5, &(0x7f0000000200)) 04:45:38 executing program 0 (fault-call:2 fault-nth:2): mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 297.991136] minix_free_inode: bit 1 already cleared [ 298.155305] FAULT_INJECTION: forcing a failure. [ 298.155305] name failslab, interval 1, probability 0, space 0, times 0 [ 298.272941] CPU: 1 PID: 8450 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 298.281414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.290790] Call Trace: [ 298.293412] dump_stack+0x244/0x39d [ 298.297072] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.302282] ? debug_smp_processor_id+0x1c/0x20 [ 298.306984] ? perf_trace_lock+0x14d/0x7a0 [ 298.311245] should_fail.cold.4+0xa/0x17 [ 298.315354] ? fault_create_debugfs_attr+0x1f0/0x1f0 04:45:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 298.320565] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 298.325517] ? kasan_check_read+0x11/0x20 [ 298.329694] ? rcu_softirq_qs+0x20/0x20 [ 298.333688] ? rcu_softirq_qs+0x20/0x20 [ 298.337670] ? unwind_dump+0x190/0x190 [ 298.341585] ? find_held_lock+0x36/0x1c0 [ 298.345685] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.351184] ? save_stack+0xa9/0xd0 [ 298.354837] ? kmem_cache_alloc_trace+0x152/0x750 [ 298.359725] ? copy_mount_options+0x5f/0x430 [ 298.364181] __should_failslab+0x124/0x180 [ 298.368441] should_failslab+0x9/0x14 04:45:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 298.372261] kmem_cache_alloc+0x2be/0x730 [ 298.376424] ? find_held_lock+0x36/0x1c0 [ 298.380501] getname_flags+0xd0/0x590 [ 298.384353] user_path_at_empty+0x2d/0x50 [ 298.384397] do_mount+0x180/0x1d90 [ 298.384420] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.392142] ? rcu_pm_notify+0xc0/0xc0 [ 298.392163] ? copy_mount_string+0x40/0x40 [ 298.392185] ? copy_mount_options+0x5f/0x430 [ 298.392205] ? rcu_read_lock_sched_held+0x14f/0x180 [ 298.415283] ? kmem_cache_alloc_trace+0x353/0x750 [ 298.420170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.425740] ? copy_mount_options+0x315/0x430 [ 298.430266] ksys_mount+0x12d/0x140 [ 298.433921] __x64_sys_mount+0xbe/0x150 [ 298.437924] do_syscall_64+0x1b9/0x820 [ 298.441842] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.441864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.441881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.441900] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.441922] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.452249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.452274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.452287] RIP: 0033:0x457569 [ 298.452304] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.452340] RSP: 002b:00007f982e814c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 298.507089] RAX: ffffffffffffffda RBX: 00007f982e814c90 RCX: 0000000000457569 [ 298.514490] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 04:45:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) listen(0xffffffffffffffff, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r2, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 298.521782] RBP: 000000000072bf00 R08: 0000000020000300 R09: 0000000000000000 [ 298.529075] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e8156d4 [ 298.536384] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000003 04:45:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) socketpair(0x5, 0x4, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'bpq0\x00'}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x9c, &(0x7f00000000c0)="6e757dc67030077180b1cc3a291319c703ee6676ed3f00000004126a461800d8bc2a56ae94a4101eca6e9e449943120df0a5216fa70c7c7f513a897956330cbbc4c7078f544063209f185ce8b1b5c76161e28626a16af4d95bb5b058cbfbdec63ce2eca39d1b3b9e89f97e9de6805288b3a0b85a1c1a51fac2f69aab406083143070e01769b05c8bc4d3a2079663318ce8888ec94ac8c5f42c000000"}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x0, 0xffffffffffffff2d, &(0x7f00000000c0)}) 04:45:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ptrace$setopts(0x4206, r1, 0x401, 0x100072) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001340), 0x361, &(0x7f00000013c0)}, 0x20000054) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x7a0a0130, @ipv4={[], [], @multicast2}, 0xa9c5}, 0x1c) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000200), 0x4) 04:45:39 executing program 0 (fault-call:2 fault-nth:3): mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 298.745565] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000203) [ 298.756312] minix_free_inode: bit 1 already cleared [ 298.762634] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000203) [ 298.770615] FAT-fs (loop2): Filesystem has been set read-only [ 298.779167] FAT-fs (loop4): Filesystem has been set read-only 04:45:39 executing program 5: r0 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000040)={&(0x7f0000000000)=@dellink={0x28, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x1f}]}, 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 04:45:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) listen(0xffffffffffffffff, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r2, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 298.948033] FAULT_INJECTION: forcing a failure. [ 298.948033] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 298.959899] CPU: 0 PID: 8509 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 298.968347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.977724] Call Trace: [ 298.980379] dump_stack+0x244/0x39d [ 298.984048] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.989271] ? mark_held_locks+0x130/0x130 [ 298.993583] should_fail.cold.4+0xa/0x17 04:45:39 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x280, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@local, @multicast2, @multicast1}, 0xc) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x9, {{0x2, 0x4e23, @rand_addr=0x1000}}, {{0x2, 0x40000000004e20, @multicast2}}}, 0xfb) [ 298.997682] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.002823] ? mark_held_locks+0x130/0x130 [ 299.007078] ? mark_held_locks+0x130/0x130 [ 299.011359] ? zap_class+0x640/0x640 [ 299.015115] ? print_usage_bug+0xc0/0xc0 [ 299.019221] ? find_held_lock+0x36/0x1c0 [ 299.023360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.028925] ? should_fail+0x22d/0xd01 [ 299.032844] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.038053] __alloc_pages_nodemask+0x34b/0xdd0 [ 299.042768] ? rcu_softirq_qs+0x20/0x20 [ 299.046772] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 299.051820] ? find_held_lock+0x36/0x1c0 [ 299.051863] ? trace_hardirqs_off+0xb8/0x310 [ 299.051885] cache_grow_begin+0xa5/0x8c0 [ 299.051906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.070000] ? check_preemption_disabled+0x48/0x280 [ 299.075047] kmem_cache_alloc+0x66b/0x730 [ 299.079223] ? find_held_lock+0x36/0x1c0 [ 299.083349] getname_flags+0xd0/0x590 [ 299.087182] user_path_at_empty+0x2d/0x50 [ 299.091392] do_mount+0x180/0x1d90 [ 299.094969] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.100533] ? rcu_pm_notify+0xc0/0xc0 [ 299.104454] ? copy_mount_string+0x40/0x40 [ 299.108722] ? copy_mount_options+0x5f/0x430 [ 299.113155] ? rcu_read_lock_sched_held+0x14f/0x180 [ 299.118202] ? kmem_cache_alloc_trace+0x353/0x750 [ 299.123071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.128631] ? _copy_from_user+0xdf/0x150 [ 299.132806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.138391] ? copy_mount_options+0x315/0x430 [ 299.142953] ksys_mount+0x12d/0x140 [ 299.146610] __x64_sys_mount+0xbe/0x150 [ 299.150617] do_syscall_64+0x1b9/0x820 [ 299.154527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.159929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.164885] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.169929] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.174973] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 299.181774] ? __switch_to_asm+0x40/0x70 [ 299.185857] ? __switch_to_asm+0x34/0x70 [ 299.189949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.194829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.200038] RIP: 0033:0x457569 [ 299.203258] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.222181] RSP: 002b:00007f982e7f3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 299.229913] RAX: ffffffffffffffda RBX: 00007f982e7f3c90 RCX: 0000000000457569 [ 299.237203] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 04:45:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 299.244493] RBP: 000000000072bfa0 R08: 0000000020000300 R09: 0000000000000000 [ 299.251785] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e7f46d4 [ 299.259086] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000005 04:45:39 executing program 0 (fault-call:2 fault-nth:4): mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) [ 299.391156] minix_free_inode: bit 1 already cleared 04:45:39 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)='./file1\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000c7"], &(0x7f0000000400)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x5, 0x81, 0x100000000, 0x2, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 04:45:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x400, 0x80000) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x6, 0x200, 0x39, 0x20, 0x0, 0xfff, 0x20000, 0x6, 0x1, 0x8, 0x3, 0x1, 0x40, 0x100000000, 0x1, 0x6, 0x9, 0x81, 0x2c6b, 0x9de0, 0x1f, 0x4, 0xfffffffffffff493, 0x1, 0xff, 0x2, 0x101, 0x1fe0000000000, 0x1, 0x10000000, 0x81, 0x8, 0x6, 0x9, 0x5ef, 0x100000000, 0x0, 0x1000, 0x2, @perf_config_ext={0x800, 0x5}, 0x800, 0x4, 0xac82, 0x7, 0x0, 0xa03, 0x7bbdbd90}, r0, 0x5, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000280)) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) fdatasync(r2) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100)="0b873b7434303420", 0x8, 0xffffffffffffffff) keyctl$update(0x2, 0x0, &(0x7f0000000140)="3736ed8e464d719ea737c8dc1933edd7111349e43d2d0a02e67ea39b4ff04fc50e8627f3eaec38a90b1dd03d23424f43f0ac44056d1328f15466f233405c1cbf29b758d06ae223a475ad50bbeb5faa7e952d9f5764058c397490ffe13160da49b68893", 0x63) [ 299.607524] FAULT_INJECTION: forcing a failure. [ 299.607524] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 299.619400] CPU: 1 PID: 8540 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 299.627843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.637222] Call Trace: [ 299.639856] dump_stack+0x244/0x39d [ 299.643524] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.648746] ? mark_held_locks+0x130/0x130 [ 299.653021] should_fail.cold.4+0xa/0x17 [ 299.657122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.662257] ? mark_held_locks+0x130/0x130 [ 299.666526] ? mark_held_locks+0x130/0x130 [ 299.670784] ? zap_class+0x640/0x640 [ 299.674530] ? print_usage_bug+0xc0/0xc0 [ 299.678635] ? find_held_lock+0x36/0x1c0 [ 299.682729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.688295] ? should_fail+0x22d/0xd01 [ 299.692244] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.697395] __alloc_pages_nodemask+0x34b/0xdd0 [ 299.702092] ? rcu_softirq_qs+0x20/0x20 [ 299.706097] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 299.711149] ? find_held_lock+0x36/0x1c0 [ 299.715267] ? trace_hardirqs_off+0xb8/0x310 [ 299.719711] cache_grow_begin+0xa5/0x8c0 [ 299.723814] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.729395] ? check_preemption_disabled+0x48/0x280 [ 299.734452] kmem_cache_alloc+0x66b/0x730 [ 299.738637] getname_flags+0xd0/0x590 [ 299.742474] user_path_at_empty+0x2d/0x50 [ 299.746658] do_mount+0x180/0x1d90 [ 299.750231] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.755803] ? rcu_pm_notify+0xc0/0xc0 [ 299.759733] ? copy_mount_string+0x40/0x40 [ 299.763998] ? copy_mount_options+0x5f/0x430 [ 299.768437] ? rcu_read_lock_sched_held+0x14f/0x180 [ 299.773484] ? kmem_cache_alloc_trace+0x353/0x750 [ 299.778381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.783951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.789517] ? copy_mount_options+0x315/0x430 [ 299.794048] ksys_mount+0x12d/0x140 [ 299.797715] __x64_sys_mount+0xbe/0x150 [ 299.801725] do_syscall_64+0x1b9/0x820 [ 299.805638] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.811253] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.816210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.821084] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.826130] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.831175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.836049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.836063] RIP: 0033:0x457569 04:45:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0xa0000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000280)=0x3) r2 = open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000300)='./file0\x00') r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000240)='./file0\x00', r2, &(0x7f00000001c0)='./file1\x00', 0x0) tee(r0, r3, 0x0, 0x9) 04:45:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:40 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)='./file1\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000c7"], &(0x7f0000000400)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x5, 0x81, 0x100000000, 0x2, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) [ 299.836081] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.836090] RSP: 002b:00007f982e814c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 299.863446] RAX: ffffffffffffffda RBX: 00007f982e814c90 RCX: 0000000000457569 [ 299.863456] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 299.863466] RBP: 000000000072bf00 R08: 0000000020000300 R09: 0000000000000000 [ 299.863476] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e8156d4 [ 299.863487] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000003 04:45:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0xa0000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000280)=0x3) r2 = open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000300)='./file0\x00') r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000240)='./file0\x00', r2, &(0x7f00000001c0)='./file1\x00', 0x0) tee(r0, r3, 0x0, 0x9) 04:45:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)='./file1\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000c7"], &(0x7f0000000400)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x5, 0x81, 0x100000000, 0x2, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 04:45:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r2, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000000c0)='./file0/f.le.\x00') 04:45:40 executing program 0 (fault-call:2 fault-nth:5): mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f1375", 0x13, 0x400}], 0xa00005, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) 04:45:40 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x4}}, 0x0, 0x0, 0x1000, 0x1, 0x794a71a6}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0x10000200003) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000000c0)='./file0/f.le.\x00') [ 300.132593] minix_free_inode: bit 1 already cleared [ 300.311232] FAULT_INJECTION: forcing a failure. [ 300.311232] name failslab, interval 1, probability 0, space 0, times 0 [ 300.322664] CPU: 0 PID: 8587 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 300.331094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.340469] Call Trace: [ 300.343167] dump_stack+0x244/0x39d [ 300.346862] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.352093] ? kernel_text_address+0x79/0xf0 [ 300.356537] should_fail.cold.4+0xa/0x17 [ 300.360637] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.365779] ? save_stack+0xa9/0xd0 [ 300.369439] ? save_stack+0x43/0xd0 [ 300.373089] ? kmem_cache_alloc_trace+0x152/0x750 [ 300.378050] ? vfs_new_fs_context+0x5e/0x77c [ 300.382485] ? do_mount+0xb70/0x1d90 [ 300.386223] ? ksys_mount+0x12d/0x140 [ 300.390049] ? __x64_sys_mount+0xbe/0x150 [ 300.394227] ? do_syscall_64+0x1b9/0x820 [ 300.398346] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.403752] ? find_held_lock+0x36/0x1c0 04:45:40 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = gettid() pause() wait4(r0, &(0x7f0000000000), 0x4, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f00000001c0), 0x1, &(0x7f0000000200)) tkill(r0, 0xa) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xc) ptrace$poke(0x5, r0, &(0x7f0000000180), 0x8) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x8) [ 300.407888] ? bg_scan_update+0x1d8/0x5a0 [ 300.412076] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.412132] ? lockref_get+0x42/0x50 [ 300.412155] ? lock_downgrade+0x900/0x900 [ 300.425535] __should_failslab+0x124/0x180 [ 300.429800] should_failslab+0x9/0x14 [ 300.433672] kmem_cache_alloc_trace+0x2d7/0x750 [ 300.438399] ? rcu_read_lock_sched_held+0x14f/0x180 [ 300.443448] ? kmem_cache_alloc_trace+0x353/0x750 [ 300.448370] legacy_init_fs_context+0x187/0x230 [ 300.453075] ? vfs_dup_fs_context+0x400/0x400 [ 300.457599] vfs_new_fs_context+0x3f4/0x77c [ 300.461956] do_mount+0xb70/0x1d90 [ 300.465534] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.471102] ? copy_mount_string+0x40/0x40 [ 300.475394] ? copy_mount_options+0x5f/0x430 [ 300.479839] ? kmem_cache_alloc_trace+0x353/0x750 [ 300.484714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.490280] ? _copy_from_user+0xdf/0x150 [ 300.494494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.500058] ? copy_mount_options+0x315/0x430 [ 300.500083] ksys_mount+0x12d/0x140 [ 300.500105] __x64_sys_mount+0xbe/0x150 [ 300.500128] do_syscall_64+0x1b9/0x820 [ 300.516139] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.521536] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.526497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.526518] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.526541] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.526563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.526588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.526606] RIP: 0033:0x457569 [ 300.554765] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.573686] RSP: 002b:00007f982e814c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 300.581431] RAX: ffffffffffffffda RBX: 00007f982e814c90 RCX: 0000000000457569 [ 300.588724] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 300.596014] RBP: 000000000072bf00 R08: 0000000020000300 R09: 0000000000000000 [ 300.603304] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e8156d4 [ 300.610634] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000003 04:45:41 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600)='./file1\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000c7"], &(0x7f0000000400)=0x1) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x5, 0x81, 0x100000000, 0x2, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 04:45:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000280), 0x8) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)=0x9) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0xfffffffffffffffc, @empty, 0x4}}}, 0x84) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x10000200003) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x1, "5eac1f430bd8312f"}) sendto$inet6(0xffffffffffffffff, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000540)=ANY=[@ANYBLOB="ecffffffffffffff0000000001000000"]) mkdirat(r2, &(0x7f00000001c0)='.//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b40)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000001c80)={'raw\x00'}, &(0x7f0000001d00)=0x54) syz_mount_image$ntfs(&(0x7f00000005c0)='ntfs\x00', &(0x7f0000000600)='./file0\x00', 0x4, 0x1, &(0x7f0000001a40)=[{&(0x7f0000001a00)="94847c8b943156aaf22a24bad2c1cd82c771d79f46", 0x15}], 0x1000008, &(0x7f0000001e00)=ANY=[@ANYBLOB='errors=continue,disable_sparse=yes,rootcontext=sysadm_u,fscontext=user_u,dont_appraise,uid<', @ANYRESDEC=r3]) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000000c0)='./file0/f.le.\x00') [ 300.698927] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 300.706226] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 300.711547] Oops: 0000 [#1] PREEMPT SMP KASAN [ 300.716068] CPU: 0 PID: 8587 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 300.724486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.733875] RIP: 0010:do_mount+0xb98/0x1d90 04:45:41 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = gettid() pause() wait4(r0, &(0x7f0000000000), 0x4, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f00000001c0), 0x1, &(0x7f0000000200)) tkill(r0, 0xa) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xc) ptrace$poke(0x5, r0, &(0x7f0000000180), 0x8) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x8) [ 300.738219] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 300.757137] RSP: 0018:ffff880182c6fc28 EFLAGS: 00010246 [ 300.757226] kobject: 'loop1' (00000000f0ce766c): kobject_uevent_env [ 300.762648] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90001e6a000 [ 300.762658] RDX: 1ffffffffffffffe RSI: ffffffff81df05fc RDI: 0000000000000282 [ 300.762668] RBP: ffff880182c6fdb0 R08: ffff880186ff4000 R09: 0000000000000000 [ 300.762676] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b9906a30 [ 300.762686] R13: ffff8801833c8cc0 R14: ffff8801833c8cc0 R15: ffff8801d1db2c80 [ 300.762698] FS: 00007f982e815700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 300.762707] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 300.762723] CR2: fffffffffffffff4 CR3: 00000001d2a35000 CR4: 00000000001406f0 [ 300.771180] kobject: 'loop1' (00000000f0ce766c): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 300.776472] Call Trace: [ 300.776496] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.776520] ? copy_mount_string+0x40/0x40 [ 300.802614] kobject: 'loop5' (000000004f237158): kobject_uevent_env [ 300.805667] ? copy_mount_options+0x5f/0x430 [ 300.824436] kobject: 'loop5' (000000004f237158): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 300.827068] ? kmem_cache_alloc_trace+0x353/0x750 [ 300.827092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.879827] ? _copy_from_user+0xdf/0x150 [ 300.883999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.889570] ? copy_mount_options+0x315/0x430 [ 300.894093] ksys_mount+0x12d/0x140 [ 300.897744] __x64_sys_mount+0xbe/0x150 [ 300.901748] do_syscall_64+0x1b9/0x820 [ 300.905660] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.911049] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.915995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.920977] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.926022] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.931070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.935943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.941155] RIP: 0033:0x457569 04:45:41 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = gettid() pause() wait4(r0, &(0x7f0000000000), 0x4, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f00000001c0), 0x1, &(0x7f0000000200)) tkill(r0, 0xa) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xc) ptrace$poke(0x5, r0, &(0x7f0000000180), 0x8) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x8) 04:45:41 executing program 2: clone(0x200, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = gettid() pause() wait4(r0, &(0x7f0000000000), 0x4, &(0x7f00000000c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f00000001c0), 0x1, &(0x7f0000000200)) tkill(r0, 0xa) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xc) ptrace$poke(0x5, r0, &(0x7f0000000180), 0x8) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x8) [ 300.944387] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.963306] RSP: 002b:00007f982e814c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 300.965145] kobject: 'loop5' (000000004f237158): kobject_uevent_env [ 300.971070] RAX: ffffffffffffffda RBX: 00007f982e814c90 RCX: 0000000000457569 [ 300.971080] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 0000000000000000 [ 300.971089] RBP: 000000000072bf00 R08: 0000000020000300 R09: 0000000000000000 [ 300.971098] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f982e8156d4 [ 300.971107] R13: 00000000004c28a1 R14: 00000000004d3c90 R15: 0000000000000003 [ 300.971121] Modules linked in: [ 300.971132] CR2: fffffffffffffff4 [ 300.971147] ---[ end trace 2e05b6a87254c183 ]--- [ 300.971173] RIP: 0010:do_mount+0xb98/0x1d90 [ 300.978884] kobject: 'loop5' (000000004f237158): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 300.984863] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 300.984872] RSP: 0018:ffff880182c6fc28 EFLAGS: 00010246 [ 300.984884] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90001e6a000 [ 300.984893] RDX: 1ffffffffffffffe RSI: ffffffff81df05fc RDI: 0000000000000282 [ 300.984901] RBP: ffff880182c6fdb0 R08: ffff880186ff4000 R09: 0000000000000000 [ 300.984909] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b9906a30 [ 300.984924] R13: ffff8801833c8cc0 R14: ffff8801833c8cc0 R15: ffff8801d1db2c80 [ 301.016127] kobject: 'loop2' (00000000d474afb4): kobject_uevent_env [ 301.017219] FS: 00007f982e815700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 301.017230] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 301.017240] CR2: fffffffffffffff4 CR3: 00000001d2a35000 CR4: 00000000001406f0 [ 301.017252] Kernel panic - not syncing: Fatal exception [ 301.021719] Kernel Offset: disabled [ 301.137674] Rebooting in 86400 seconds..