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", 0x1000}, {&(0x7f00000036c0)="5ac0f859809a22cc1b2343a170cbf100cfaff702d1d423fdabcd382b2ecd289850651394a33a47466060a161f5207a358bab63636c8732cf572877e1311b27b7aec823f4f81e9ddaede3918a426654f8cf84cf99", 0x54}], 0x2, &(0x7f0000003840)=[@rights={0x20, 0x1, 0x1, [r3, r2, r4, r4]}, @rights={0x30, 0x1, 0x1, [r3, r4, r1, r1, r1, r1, r2]}, @rights={0x20, 0x1, 0x1, [r4, r2, r1, r4]}, @cred={0x20, 0x1, 0x2, r0, r5, r7}], 0x90, 0x4000}, {&(0x7f0000003900)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003c00)=[{&(0x7f0000003980)="f132ad2863728b5749e967967fc5af5a8daaeb81eea56df83249d57efc3fae75290524da278d5aee17fb45bf598b7b713b70f906a7a380691beb54f886251133a9964b4f676ec8169e40dda451d47e46f17dc9", 0x53}, {&(0x7f0000003a00)="944b404d72ce476f00346e575ff7ee948d29787327a6538301f6938c340de123b07cb2dbd0ce901beed2a5469c5c73be04a68e3d4c8d6fefdf680334863cf3f3e282f26c54e695b679a1cb3c0b8eb9ef94b1be", 0x53}, {&(0x7f0000003a80)="973ecacb675ca1aff914285bc743b617baddbfd13f705d7b919a889d187cd88da07ab2c9051e1a90797db7a75ce28ebfdf7402e11b2adf77cb8fc02a275d2c31f8ecbb747a869cb5d29e0b16de79e06829feaf9c96a18a548ccdd602c3415ba0a2a114be0ec2036649d8dbfba9", 0x6d}, {&(0x7f0000003b00)="5ca17956d1a18091140e579b590f4402ffe398411ce1e102b283ca13847bde5897fc925444d56151a25a767d45a75b245eede62e576eb66087c088151c478fde66f8e011e67ac7eaf59fff60169fcdb736330d9ce83dac4f846bf49f74ff1a93579e240b5e9ce29dd36594881b1f223fcc11a8047b8936eddf5f36a85062a820cfb8b32aefa94fe9946e776bf670a567da5f3af07671fa4cd62d5bd412d8532e215e980e79c2692e75d3f6bff694f3718440532d25e5d41398c2d7fae93e7972f808d6055e2d698aa2c249d4df1f3d14aae79622cb040f22fe", 0xd9}], 0x4, &(0x7f0000003c80)=[@rights={0x20, 0x1, 0x1, [r3, r9, r4]}, @cred={0x20, 0x1, 0x2, r0, r6, r7}], 0x40}, {&(0x7f0000003cc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003fc0), 0x0, &(0x7f0000004000)=[@rights={0x18, 0x1, 0x1, [r9]}, @cred={0x20, 0x1, 0x2, r0, r6, r7}], 0x38, 0x20000000}], 0x4, 0x0) r10 = dup(r4) write$P9_RSTAT(r10, &(0x7f0000000180)=ANY=[], 0x0) 13:48:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xd000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:15 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='v/at\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:15 executing program 5 (fault-call:2 fault-nth:15): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 416.058040] XFS (loop2): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 416.066830] XFS (loop2): DAX unsupported by block device. Turning off DAX. [ 416.180451] FAULT_INJECTION: forcing a failure. [ 416.180451] name failslab, interval 1, probability 0, space 0, times 0 [ 416.191962] CPU: 0 PID: 29198 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 416.199004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.208396] Call Trace: [ 416.211018] dump_stack+0x1c9/0x2b4 [ 416.214682] ? dump_stack_print_info.cold.2+0x52/0x52 [ 416.219914] should_fail.cold.4+0xa/0x11 [ 416.224050] ? graph_lock+0x170/0x170 [ 416.227887] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 416.232356] attempt to access beyond end of device [ 416.233063] ? mutex_trylock+0x2b0/0x2b0 [ 416.233096] ? graph_lock+0x170/0x170 [ 416.233122] ? find_held_lock+0x36/0x1c0 [ 416.233146] ? __lock_is_held+0xb5/0x140 [ 416.238197] loop2: rw=4096, want=32768, limit=2 [ 416.242252] ? check_same_owner+0x340/0x340 [ 416.242266] ? kasan_check_write+0x14/0x20 [ 416.242282] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 416.242303] ? rcu_note_context_switch+0x730/0x730 13:48:15 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe9260000) 13:48:15 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 416.271193] XFS (loop2): last sector read failed [ 416.272456] __should_failslab+0x124/0x180 [ 416.272475] should_failslab+0x9/0x14 [ 416.272498] kmem_cache_alloc+0x2af/0x760 [ 416.272523] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 416.272541] __kernfs_new_node+0xef/0x5a0 [ 416.272563] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 416.308480] ? mutex_unlock+0xd/0x10 [ 416.312224] ? kernfs_activate+0x21a/0x2c0 [ 416.316489] ? kernfs_walk_and_get_ns+0x340/0x340 [ 416.321365] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 416.326966] ? kernfs_link_sibling+0x1d2/0x3b0 [ 416.331593] kernfs_new_node+0x80/0xf0 [ 416.335517] __kernfs_create_file+0x4d/0x330 [ 416.339994] sysfs_add_file_mode_ns+0x21a/0x560 [ 416.344696] internal_create_group+0x282/0x970 [ 416.349310] sysfs_create_group+0x1f/0x30 [ 416.353479] lo_ioctl+0x1310/0x1d90 [ 416.357139] ? lo_rw_aio_complete+0x450/0x450 [ 416.361659] blkdev_ioctl+0x9cd/0x2030 [ 416.365647] ? blkpg_ioctl+0xc40/0xc40 [ 416.369559] ? kasan_check_read+0x11/0x20 [ 416.373731] ? rcu_is_watching+0x8c/0x150 [ 416.377898] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 416.382645] ? __fget+0x4d5/0x740 [ 416.386127] ? ksys_dup3+0x690/0x690 [ 416.389857] ? kasan_check_write+0x14/0x20 [ 416.394107] ? do_raw_spin_lock+0xc1/0x200 [ 416.398367] block_ioctl+0xee/0x130 [ 416.402013] ? blkdev_fallocate+0x400/0x400 [ 416.406527] do_vfs_ioctl+0x1de/0x1720 [ 416.410469] ? rcu_is_watching+0x8c/0x150 [ 416.414642] ? ioctl_preallocate+0x300/0x300 [ 416.419069] ? __fget_light+0x2f7/0x440 [ 416.423079] ? fget_raw+0x20/0x20 [ 416.426550] ? putname+0xf2/0x130 [ 416.430029] ? rcu_read_lock_sched_held+0x108/0x120 [ 416.435065] ? kmem_cache_free+0x25c/0x2d0 [ 416.439321] ? putname+0xf7/0x130 [ 416.442793] ? do_sys_open+0x3cb/0x760 [ 416.446705] ? security_file_ioctl+0x94/0xc0 [ 416.451135] ksys_ioctl+0xa9/0xd0 [ 416.454612] __x64_sys_ioctl+0x73/0xb0 [ 416.458523] do_syscall_64+0x1b9/0x820 [ 416.462428] ? syscall_slow_exit_work+0x500/0x500 [ 416.467289] ? syscall_return_slowpath+0x5e0/0x5e0 [ 416.472240] ? syscall_return_slowpath+0x31d/0x5e0 [ 416.477189] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 416.482578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.487447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.492653] RIP: 0033:0x456ef7 [ 416.495862] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.514961] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 416.522692] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 416.529983] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 416.537354] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 416.544637] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 416.551949] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000000f 13:48:15 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661ffff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="762070613263caca4799dacbc70fc7f8803586fd8e57565f17") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$inet6(0xa, 0x80001, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff0100b0e7682e081f0e70255d2d000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f06000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r2, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RREADDIR(r2, &(0x7f00000004c0)={0x49, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x49) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_client='access=client'}]}}) 13:48:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x66000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:15 executing program 5 (fault-call:2 fault-nth:16): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:15 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000000)={0x40000000}, 0xffffff25) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r3 = dup(r2) r4 = getuid() lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000018c0), &(0x7f0000001900), &(0x7f0000001940)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001a80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, &(0x7f0000001b00)=0xc) getresuid(&(0x7f0000001b40), &(0x7f0000001b80), &(0x7f0000001bc0)=0x0) getgroups(0x5, &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0xee00, 0x0]) r12 = geteuid() r13 = getegid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003300)={0x0, 0x0}, &(0x7f0000003340)=0xc) r15 = getegid() r16 = openat$vsock(0xffffffffffffff9c, &(0x7f0000003640)='/dev/vsock\x00', 0x80040, 0x0) r17 = geteuid() getresgid(&(0x7f0000003680), &(0x7f00000036c0), &(0x7f0000003700)=0x0) stat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003800)={0x0, 0x0, 0x0}, &(0x7f0000003840)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003880)={0x0, 0x0, 0x0}, &(0x7f00000038c0)=0xc) stat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003c40)={0x0, 0x0, 0x0}, &(0x7f0000003c80)=0xc) sendmmsg$unix(r3, &(0x7f0000003d00)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000000200)="462f09e1f607fa5710e67c9b7daa7a8f0a14df82a7ab57bb5d99ff2ef6ba11a908100e3b40fb1107e898006d7c006cb62d85ff02f13b954b2438413195c0883a3b1df98bffd81f49b8e459146f88c06f53f94b1827db0af58aa25ffb65a86069e5d6ce2b06b28df6e94b6c994d78cce03f1f13cd1df8416a9335b528ca9c1396c0a8f9", 0x83}, {&(0x7f0000000040)="7e3782c78f3d731daecd7a5754f341b6dae9bfacff5b921d854eecc758f192bf57e69b8619", 0x25}, {&(0x7f00000002c0)="7a0ba25da1afba07eed4e90542e10666eba6ce6c7c8d2af25b67caaed1c51774e4b9cd95d3efb36d33474d71883cfc7395f80c14217fcce4a6d35b1b9636c39f065bd355e5f2afc0bb6e0477e4fe06a4851a8dad77a94762e704f5cf6004a269944bb8a3", 0x64}, {&(0x7f0000000340)="0026612319e20c23f74c96a3a1c6bd3773f9b7e51d6eb93654ad4062264d2ff13189e94d5364e74c429968f7f45bf2f994b98fb2807737257da9127446773cab3d8af8b11bf7f43cd34e60b24776e7242d98dd603f40dda3c002145f29a0a0cd80f02fd592a0bc4834a86e3590a3ac76d7209dc4ac12a9dccd01a77d2ffaf57ef4f072637fe31e", 0x87}, {&(0x7f0000000400)="a36452dee2fc16370a89c36600d22d908e10ed66186b54224d290f0489985c266cd4194af645ff5da7c67bc7a83ea4ab3b81ccf91403a1eb1273b1d78660b2e885a44d4c8b47f9f4d752b7c6ebbafb21b072c49dc720efe5341ed877d943ca65bd126274e7bbef2a8cd4c6c98f4137de608a87da4790abf8144f0332ac238d16ea457b07c53268dc457b45ea11bd087b06dde30a1904ebb7bd2dd460b56b5311e19725bf047e27fd12ddfb64dde3d96f54235d68e0f58eadb223406f67cdb49e090e6cf78ca6468d", 0xc8}, {&(0x7f0000000500)="f3092bdd70d750f8da41518ac7a6d543341b9cd9dcd1b7bd250931b1ae08c1ec40dd7a39bdb5b1a9dbecbe28ab79c85b320fd14aea0d63c12fb86a17ef0af4c891ad38c778d9372c24c132dc472e5ee693b8f1a23128f63770574cee3a7f2800b706eed505f574e4a0f98a1559cd7ba007e55adef3cc75d79463b9bcfcb61091ab349f159d26053372c8a4df3b3babb13c", 0x91}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="d5cc48d2d3240687344865ae615e1abe254d938ec04ed2bbc87948ec0ea825232d3deabea0a46b7f69db4bd36e94cfde5ce69760656461bc415c258a3bb7664d964b9f8d5c3c3a76c0404406c7612deef07577ee47e3581aeb4bb4c4a7f8cd4f67fb9eb2747d8f4e604de3ca257fb09b6f7713fb68be9aa976435653230bee17adef3da6e33b563f4fbc2cfbeb082112408ebac639951c8554dbac2420872aed700ae02d8ae6a240c6c3fdc26abef0d7044989df15878401740af55a5c6aa87d51dda3aa6f89d0d5741b877bb7ea62d12727", 0xd2}], 0x8, &(0x7f0000001c40)=[@rights={0x18, 0x1, 0x1, [r2, r2]}, @rights={0x18, 0x1, 0x1, [r2, r1]}, @cred={0x20, 0x1, 0x2, r0, r4, r5}, @rights={0x20, 0x1, 0x1, [r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r0, r6, r7}, @cred={0x20, 0x1, 0x2, r0, r8, r9}, @cred={0x20, 0x1, 0x2, r0, r10, r11}, @rights={0x18, 0x1, 0x1, [r3]}, @cred={0x20, 0x1, 0x2, r0, r12, r13}, @rights={0x20, 0x1, 0x1, [r1, r3, r3, r3]}], 0x128, 0x4000011}, {&(0x7f0000001d80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002f40)=[{&(0x7f0000001e00)="4785db7bb3dd841c419e00780dacc0dcd3428c2371c9a9baff2c8a365e727dcec9e9ba5281526ee74a712baa2ee06b99c9becd1d42eabf5dbe48c64894d0d40cef27b0328c7e9326824cc7a87866167782e7e53fffa7deaab665022ec40cb683ca24029799f56b04d93e3219525fa1c8580cafb179af5716ba17c66a694c48dd2cd58b56043582a0d8706946c78b6cb617594b4cbf1bc8144a82e4c582a2f57f652922b13d728acd44cc85cf522a053dde5ec7088a7bb22803b7ca8f786b2d0dfe46e95c8c23d0218a7ba42f2d92b3", 0xcf}, {&(0x7f0000001f00)="59a2fc731db54401682bb73ffa332762b485a90acca68e177290", 0x1a}, {&(0x7f0000001f40)="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", 0x1000}], 0x3, &(0x7f0000002f80)=[@rights={0x20, 0x1, 0x1, [r2, r3, r1]}, @rights={0x20, 0x1, 0x1, [r2, r2, r3]}, @rights={0x28, 0x1, 0x1, [r2, r3, r2, r1, r3, r2]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x18, 0x1, 0x1, [r3, r2]}], 0x98, 0x10}, {&(0x7f0000003040)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000032c0)=[{&(0x7f00000030c0)="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", 0xff}, {&(0x7f00000031c0)="02bb8ac0d796e3b3d7bc7d1e0de4ef41383265ff6506aaf338e469", 0x1b}, {&(0x7f0000003200)="1d9d57677c566e0c9a85", 0xa}, {&(0x7f0000003240)="326ac85389c7d3f49756f267cdec9dd39326fbd4f6969e39fff6caf639bd59fec5876e16d7f18d68747749293eab709989a118be04e49d73df75d669022ed81dbd7b8059b61f19273d1d785f9857a17158b875c34d143d6d", 0x58}], 0x4, &(0x7f0000003380)=[@rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r0, r14, r15}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r1, r2, r3]}, @rights={0x18, 0x1, 0x1, [r1, r1]}], 0x78, 0x4000}, {&(0x7f0000003400)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000003480)="c18dbf64fc02450946a8dffad01f7830688ec74afd08886a886b8f57b2f4d00412894c670f98e9ef28768c04029ef1b30bc703801d9380060e7c91ef7de689418e3439d5175beb2987ff4ee7629bed42151612bb31441d26c055bf52dc19ff9c1176cd8f3560a1133416bfa1c62b6e0a4d83141cd4856f6b26de17b9f3d466b29884ba92287b69dee001092dbd6d662dcf5a2616777d21d21aeb9e694cd275a62b775687ee2887269405102fd4aa32bc6180492b72e739d7d6483b197840611910c1ba7d1defc8efc944c22a7f2c231bab0580355266e5", 0xd7}, {&(0x7f0000003580)="2f396f6966edd9e5f3b2622df492", 0xe}, {&(0x7f00000035c0)="e183f9e0f9b9d3211c379757230503204f3e7f261ff53138e11e", 0x1a}], 0x3, &(0x7f0000003900)=[@rights={0x30, 0x1, 0x1, [r2, r2, r16, r3, r3, r1, r1]}, @cred={0x20, 0x1, 0x2, r0, r17, r18}, @rights={0x18, 0x1, 0x1, [r3, r1]}, @rights={0x18, 0x1, 0x1, [r1, r2]}, @cred={0x20, 0x1, 0x2, r0, r19, r20}, @cred={0x20, 0x1, 0x2, r0, 0xee00, r21}], 0xc0, 0x776dad7d3b3d43a2}, {&(0x7f00000039c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003b40)=[{&(0x7f0000003a40)="77d96450f373e56a691d8ceaae2a36f39fb898ede19529e34bdc3f1657afb086d280f2485d85b6df2e3595f3de55a5dd95a1a095572ddd9d84b50910ff667e90ca3d1527b74bd38814e5b8501b57efbeb9c07d7f837df2aa8ac1dc72c2bbda5c69376de4e003ef8ff2a3f897ffa1d307f784e4b1d1feb735547bd357b07f60237c80e796209777ada6fc2f322e7bb7ce7022669804c077918fa9c4e4db76662ba6e112828ad0595b24dcf93095448e1be5f2ee2fc0e91477d08e7225e967fa34f159122128a20a2d34cccaa69e90c79794d293aa72f2ed964c33df924e3777ed8b3d7b7d9442302194a6651f81c552bcfe2d7e8cc2f5d1", 0xf7}], 0x1, &(0x7f0000003cc0)=[@cred={0x20, 0x1, 0x2, r0, r22, r23}], 0x20, 0x800}], 0x5, 0x20000000) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) [ 416.880985] FAULT_INJECTION: forcing a failure. [ 416.880985] name failslab, interval 1, probability 0, space 0, times 0 [ 416.892442] CPU: 1 PID: 29253 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 416.899488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.908867] Call Trace: [ 416.911495] dump_stack+0x1c9/0x2b4 [ 416.915344] ? dump_stack_print_info.cold.2+0x52/0x52 [ 416.920576] should_fail.cold.4+0xa/0x11 [ 416.924668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 416.929795] ? kasan_check_write+0x14/0x20 [ 416.934063] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 416.939014] ? lock_downgrade+0x8f0/0x8f0 [ 416.943195] ? wait_for_completion+0x8d0/0x8d0 [ 416.947806] ? graph_lock+0x170/0x170 [ 416.951636] ? graph_lock+0x170/0x170 [ 416.955461] ? kasan_check_write+0x14/0x20 [ 416.959737] ? find_held_lock+0x36/0x1c0 [ 416.963835] ? __lock_is_held+0xb5/0x140 [ 416.967971] ? check_same_owner+0x340/0x340 [ 416.972325] ? rcu_note_context_switch+0x730/0x730 [ 416.977290] __should_failslab+0x124/0x180 [ 416.981549] should_failslab+0x9/0x14 [ 416.985379] kmem_cache_alloc_trace+0x2cb/0x780 [ 416.990080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.995642] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 417.000512] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 417.005394] ? device_create_file+0x1e0/0x1e0 [ 417.009949] kobject_uevent_env+0x20f/0x1110 [ 417.014384] ? internal_create_group+0x347/0x970 [ 417.019182] kobject_uevent+0x1f/0x30 [ 417.023012] lo_ioctl+0x138e/0x1d90 [ 417.026712] ? lo_rw_aio_complete+0x450/0x450 [ 417.031239] blkdev_ioctl+0x9cd/0x2030 [ 417.035298] ? blkpg_ioctl+0xc40/0xc40 [ 417.039221] ? kasan_check_read+0x11/0x20 [ 417.043391] ? rcu_is_watching+0x8c/0x150 [ 417.047565] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 417.052272] ? __fget+0x4d5/0x740 [ 417.055760] ? ksys_dup3+0x690/0x690 [ 417.059519] ? kasan_check_write+0x14/0x20 [ 417.063783] ? do_raw_spin_lock+0xc1/0x200 [ 417.068051] block_ioctl+0xee/0x130 [ 417.071704] ? blkdev_fallocate+0x400/0x400 [ 417.076054] do_vfs_ioctl+0x1de/0x1720 [ 417.079987] ? rcu_is_watching+0x8c/0x150 [ 417.084164] ? ioctl_preallocate+0x300/0x300 [ 417.088596] ? __fget_light+0x2f7/0x440 [ 417.092597] ? fget_raw+0x20/0x20 [ 417.096076] ? putname+0xf2/0x130 [ 417.099554] ? rcu_read_lock_sched_held+0x108/0x120 [ 417.104598] ? kmem_cache_free+0x25c/0x2d0 [ 417.108856] ? putname+0xf7/0x130 [ 417.112333] ? do_sys_open+0x3cb/0x760 [ 417.116248] ? security_file_ioctl+0x94/0xc0 [ 417.120686] ksys_ioctl+0xa9/0xd0 [ 417.124165] __x64_sys_ioctl+0x73/0xb0 [ 417.128081] do_syscall_64+0x1b9/0x820 [ 417.131993] ? finish_task_switch+0x1d3/0x870 [ 417.136513] ? syscall_return_slowpath+0x5e0/0x5e0 [ 417.141473] ? syscall_return_slowpath+0x31d/0x5e0 [ 417.146441] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 417.151836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.156801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.162533] RIP: 0033:0x456ef7 13:48:16 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666610100", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:16 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfbffffff00000000) [ 417.165748] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.184788] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 417.192518] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 417.199804] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 417.207166] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 417.214462] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 417.221752] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000010 13:48:16 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r1}) recvfrom$llc(r3, &(0x7f0000000100)=""/117, 0x75, 0x40002000, &(0x7f0000000180)={0x1a, 0x18, 0x14, 0x0, 0x20, 0x3}, 0x10) r4 = dup(r2) write$P9_RSTAT(r4, &(0x7f0000000180)=ANY=[], 0x0) 13:48:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2300}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:16 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666610100", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="762070613263caca4799dacbc70fc7f8803586fd8e57565f17") pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) r3 = socket$inet6(0xa, 0x80001, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff0100b0e7682e081f0e70255d2d000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f06000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x90) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) write$P9_RREADDIR(r2, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RREADDIR(r2, &(0x7f00000004c0)={0x49, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x49) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_client='access=client'}]}}) 13:48:16 executing program 5 (fault-call:2 fault-nth:17): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:16 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:16 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xab040000) 13:48:16 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 417.708124] FAULT_INJECTION: forcing a failure. [ 417.708124] name failslab, interval 1, probability 0, space 0, times 0 [ 417.719615] CPU: 0 PID: 29315 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 417.726658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.736035] Call Trace: [ 417.738659] dump_stack+0x1c9/0x2b4 [ 417.742328] ? dump_stack_print_info.cold.2+0x52/0x52 [ 417.747556] ? is_bpf_text_address+0xd7/0x170 [ 417.752108] should_fail.cold.4+0xa/0x11 [ 417.756206] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 417.761352] ? save_stack+0xa9/0xd0 [ 417.765019] ? graph_lock+0x170/0x170 [ 417.768855] ? kasan_kmalloc+0xc4/0xe0 [ 417.772784] ? kmem_cache_alloc_trace+0x152/0x780 [ 417.777689] ? kobject_uevent_env+0x20f/0x1110 [ 417.782305] ? kobject_uevent+0x1f/0x30 [ 417.786319] ? find_held_lock+0x36/0x1c0 [ 417.790422] ? __lock_is_held+0xb5/0x140 [ 417.794552] ? check_same_owner+0x340/0x340 [ 417.798902] ? rcu_note_context_switch+0x730/0x730 [ 417.803898] __should_failslab+0x124/0x180 [ 417.808206] should_failslab+0x9/0x14 [ 417.812035] __kmalloc+0x2c8/0x760 [ 417.815601] ? kobject_uevent_env+0x20f/0x1110 [ 417.820210] ? rcu_read_lock_sched_held+0x108/0x120 [ 417.825252] ? kobject_get_path+0xc2/0x1a0 [ 417.829521] kobject_get_path+0xc2/0x1a0 [ 417.833618] kobject_uevent_env+0x234/0x1110 [ 417.838051] ? internal_create_group+0x347/0x970 [ 417.842843] kobject_uevent+0x1f/0x30 [ 417.846686] lo_ioctl+0x138e/0x1d90 [ 417.850354] ? lo_rw_aio_complete+0x450/0x450 [ 417.854879] blkdev_ioctl+0x9cd/0x2030 [ 417.858798] ? blkpg_ioctl+0xc40/0xc40 [ 417.862717] ? kasan_check_read+0x11/0x20 [ 417.866885] ? rcu_is_watching+0x8c/0x150 [ 417.871092] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 417.875798] ? __fget+0x4d5/0x740 [ 417.879282] ? ksys_dup3+0x690/0x690 [ 417.883028] ? kasan_check_write+0x14/0x20 [ 417.887286] ? do_raw_spin_lock+0xc1/0x200 [ 417.891557] block_ioctl+0xee/0x130 [ 417.895208] ? blkdev_fallocate+0x400/0x400 [ 417.899553] do_vfs_ioctl+0x1de/0x1720 [ 417.903466] ? rcu_is_watching+0x8c/0x150 [ 417.907648] ? ioctl_preallocate+0x300/0x300 [ 417.912077] ? __fget_light+0x2f7/0x440 [ 417.916073] ? fget_raw+0x20/0x20 [ 417.919548] ? putname+0xf2/0x130 [ 417.923050] ? rcu_read_lock_sched_held+0x108/0x120 [ 417.928090] ? kmem_cache_free+0x25c/0x2d0 [ 417.932355] ? putname+0xf7/0x130 [ 417.935835] ? do_sys_open+0x3cb/0x760 [ 417.939753] ? security_file_ioctl+0x94/0xc0 [ 417.944188] ksys_ioctl+0xa9/0xd0 [ 417.947666] __x64_sys_ioctl+0x73/0xb0 [ 417.951590] do_syscall_64+0x1b9/0x820 [ 417.955499] ? finish_task_switch+0x1d3/0x870 [ 417.960024] ? syscall_return_slowpath+0x5e0/0x5e0 [ 417.965002] ? syscall_return_slowpath+0x31d/0x5e0 [ 417.969990] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 417.975381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.980257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.985465] RIP: 0033:0x456ef7 [ 417.988685] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:48:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xf00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 418.007692] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 418.015508] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 418.022792] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 418.030077] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 418.037361] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 418.044640] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000011 13:48:17 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:17 executing program 2: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:17 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:17 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x8000) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f00000001c0)={0x4, 0xaa, &(0x7f0000000100)="c105b0d754efe48df54807a1bab656aa1a07492be7bf86c8680d07b3b95c04ba19b59da6453fe956376cb79a60d682b0886f60794d22f66a8112324de5c527db22960fde174ac195755bdf507ce877aa3f4fd73e27242865a8fc68ebce297abd35940825c948ef6a1b8330d838411dd3430f52bdd882fec578a351f24583f599e79e9b95b047c4f316af6a743c29c3232b2748ad9bbe30ba0c0d674f9431f55605742f3a2d5600b64cd0"}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r4 = dup(r2) write$P9_RSTAT(r4, &(0x7f0000000180)=ANY=[], 0x0) 13:48:17 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4a7) 13:48:17 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:17 executing program 2: clock_nanosleep(0xa, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000002ff0)) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) 13:48:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001d80)={'gre0\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, r3}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) r5 = accept(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x100, @remote, 0x10001}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x9}, 0x8) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) recvmmsg(r1, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c5f720000000000000000000000000000000000000000000000000000004000000000003abf4ff0a8612ba4000000000000000038000000000000004aec38d0481a1b197c4a00000000000000000000e3d294000000000000000000000000000000000000000ef60000000000000000000000000000000000ec095bcd335c854af16a86f1887d348e69d8e143e0b892f1b7731232013c4c2ea9da90069db01405395ea9a321ae102c2d3907a11ed37d129238a7d7c3784f0100012baab56885b275efe9da7b2b"], 0x78) 13:48:17 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:17 executing program 5 (fault-call:2 fault-nth:18): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:17 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:17 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffff5) 13:48:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x9}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 418.812237] FAULT_INJECTION: forcing a failure. [ 418.812237] name failslab, interval 1, probability 0, space 0, times 0 [ 418.823675] CPU: 0 PID: 29415 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 418.830705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.840075] Call Trace: [ 418.842679] dump_stack+0x1c9/0x2b4 [ 418.846321] ? dump_stack_print_info.cold.2+0x52/0x52 [ 418.851528] ? is_bpf_text_address+0xd7/0x170 [ 418.856036] should_fail.cold.4+0xa/0x11 [ 418.860107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 418.865230] ? save_stack+0xa9/0xd0 [ 418.868866] ? graph_lock+0x170/0x170 [ 418.872669] ? kasan_kmalloc+0xc4/0xe0 [ 418.876566] ? kmem_cache_alloc_trace+0x152/0x780 [ 418.881410] ? kobject_uevent_env+0x20f/0x1110 [ 418.886028] ? kobject_uevent+0x1f/0x30 [ 418.890020] ? find_held_lock+0x36/0x1c0 [ 418.894097] ? __lock_is_held+0xb5/0x140 [ 418.898178] ? check_same_owner+0x340/0x340 [ 418.902507] ? do_raw_spin_unlock+0xa7/0x2f0 [ 418.906927] ? rcu_note_context_switch+0x730/0x730 [ 418.911880] __should_failslab+0x124/0x180 [ 418.916128] should_failslab+0x9/0x14 [ 418.919947] __kmalloc+0x2c8/0x760 [ 418.923499] ? kobject_uevent_env+0x20f/0x1110 [ 418.928098] ? rcu_read_lock_sched_held+0x108/0x120 [ 418.933123] ? kobject_get_path+0xc2/0x1a0 [ 418.937373] kobject_get_path+0xc2/0x1a0 [ 418.941448] kobject_uevent_env+0x234/0x1110 [ 418.945867] ? internal_create_group+0x347/0x970 [ 418.950640] kobject_uevent+0x1f/0x30 [ 418.954453] lo_ioctl+0x138e/0x1d90 [ 418.958101] ? lo_rw_aio_complete+0x450/0x450 [ 418.962614] blkdev_ioctl+0x9cd/0x2030 [ 418.966515] ? blkpg_ioctl+0xc40/0xc40 [ 418.970427] ? kasan_check_read+0x11/0x20 [ 418.974595] ? rcu_is_watching+0x8c/0x150 [ 418.978756] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 418.983443] ? __fget+0x4d5/0x740 [ 418.986913] ? ksys_dup3+0x690/0x690 [ 418.990642] ? kasan_check_write+0x14/0x20 [ 418.994896] ? do_raw_spin_lock+0xc1/0x200 [ 418.999141] block_ioctl+0xee/0x130 [ 419.002774] ? blkdev_fallocate+0x400/0x400 [ 419.007102] do_vfs_ioctl+0x1de/0x1720 [ 419.010995] ? rcu_is_watching+0x8c/0x150 [ 419.015153] ? ioctl_preallocate+0x300/0x300 [ 419.019564] ? __fget_light+0x2f7/0x440 [ 419.023569] ? fget_raw+0x20/0x20 [ 419.027025] ? putname+0xf2/0x130 [ 419.030484] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.035523] ? kmem_cache_free+0x25c/0x2d0 [ 419.039771] ? putname+0xf7/0x130 [ 419.043230] ? do_sys_open+0x3cb/0x760 [ 419.047128] ? security_file_ioctl+0x94/0xc0 [ 419.051543] ksys_ioctl+0xa9/0xd0 [ 419.055527] __x64_sys_ioctl+0x73/0xb0 [ 419.059447] do_syscall_64+0x1b9/0x820 [ 419.063344] ? finish_task_switch+0x1d3/0x870 [ 419.067858] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.072794] ? syscall_return_slowpath+0x31d/0x5e0 [ 419.077731] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 419.083104] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.088009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.093198] RIP: 0033:0x456ef7 [ 419.096395] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.115304] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 419.123021] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 419.130316] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 419.137590] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 419.144855] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 419.152121] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000012 13:48:18 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0xffffffffffffffff, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:18 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x11}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:18 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:18 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x93) 13:48:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x880001, 0x20000000100) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x2003e) write$UHID_CREATE2(r1, &(0x7f00000001c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x5d, 0x7, 0x5, 0x1, 0x0, 0x3, "41689bd62ae3f0d40cefb1e5bce655cf0d8bad5451135cdf311e4875d0d102e1f9741a92dc1b93627c818b48014bb56c6d7f3097c2388258b7645a5050dff655ff93ce3010afd4ab52d11135fd5552a07d1ba5dd2f5f6748f10a035f03"}, 0x175) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 13:48:18 executing program 5 (fault-call:2 fault-nth:19): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:18 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:18 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf5ffffff) 13:48:18 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0xffff, 0x4, [0xff, 0x0, 0x5, 0x4]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xe82b0000000000, 0x10}, 0xc) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[], 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2a00, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={r1, 0x1, 0x2, 0x8, 0xfffffffffffffff8, 0x7ff}, 0x14) [ 419.645546] FAULT_INJECTION: forcing a failure. [ 419.645546] name failslab, interval 1, probability 0, space 0, times 0 [ 419.657330] CPU: 0 PID: 29477 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 419.664380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.673757] Call Trace: [ 419.676366] dump_stack+0x1c9/0x2b4 [ 419.680030] ? dump_stack_print_info.cold.2+0x52/0x52 [ 419.685253] should_fail.cold.4+0xa/0x11 [ 419.689330] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 419.694459] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 419.699497] ? widen_string+0xe0/0x2e0 [ 419.703414] ? rcu_note_context_switch+0x730/0x730 [ 419.708368] ? graph_lock+0x170/0x170 [ 419.712193] ? find_held_lock+0x36/0x1c0 [ 419.716287] ? __lock_is_held+0xb5/0x140 [ 419.720380] ? check_same_owner+0x340/0x340 [ 419.724733] ? graph_lock+0x170/0x170 [ 419.728555] ? rcu_note_context_switch+0x730/0x730 [ 419.733521] __should_failslab+0x124/0x180 [ 419.737783] should_failslab+0x9/0x14 [ 419.741606] kmem_cache_alloc_node+0x272/0x780 [ 419.746206] ? find_held_lock+0x36/0x1c0 [ 419.750327] __alloc_skb+0x119/0x770 [ 419.754069] ? skb_scrub_packet+0x520/0x520 [ 419.758409] ? kasan_check_read+0x11/0x20 [ 419.762578] ? rcu_is_watching+0x8c/0x150 [ 419.766747] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 419.771446] ? netlink_has_listeners+0x2da/0x4c0 [ 419.776229] ? netlink_tap_init_net+0x3e0/0x3e0 [ 419.780941] alloc_uevent_skb+0x89/0x220 [ 419.785018] kobject_uevent_env+0x866/0x1110 [ 419.789437] ? internal_create_group+0x347/0x970 13:48:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:18 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7a00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 419.794220] kobject_uevent+0x1f/0x30 [ 419.798040] lo_ioctl+0x138e/0x1d90 [ 419.801688] ? lo_rw_aio_complete+0x450/0x450 [ 419.806204] blkdev_ioctl+0x9cd/0x2030 [ 419.810132] ? blkpg_ioctl+0xc40/0xc40 [ 419.814047] ? kasan_check_read+0x11/0x20 [ 419.818222] ? rcu_is_watching+0x8c/0x150 [ 419.822386] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 419.827082] ? __fget+0x4d5/0x740 [ 419.830546] ? ksys_dup3+0x690/0x690 [ 419.834256] ? kasan_check_write+0x14/0x20 [ 419.838489] ? do_raw_spin_lock+0xc1/0x200 [ 419.842763] block_ioctl+0xee/0x130 [ 419.846380] ? blkdev_fallocate+0x400/0x400 [ 419.850690] do_vfs_ioctl+0x1de/0x1720 [ 419.854567] ? rcu_is_watching+0x8c/0x150 [ 419.858703] ? ioctl_preallocate+0x300/0x300 [ 419.863099] ? __fget_light+0x2f7/0x440 [ 419.867076] ? fget_raw+0x20/0x20 [ 419.870539] ? putname+0xf2/0x130 [ 419.874015] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.879036] ? kmem_cache_free+0x25c/0x2d0 [ 419.883258] ? putname+0xf7/0x130 [ 419.886705] ? do_sys_open+0x3cb/0x760 [ 419.890598] ? security_file_ioctl+0x94/0xc0 [ 419.895012] ksys_ioctl+0xa9/0xd0 [ 419.898458] __x64_sys_ioctl+0x73/0xb0 [ 419.902358] do_syscall_64+0x1b9/0x820 [ 419.906246] ? finish_task_switch+0x1d3/0x870 [ 419.910748] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.915684] ? syscall_return_slowpath+0x31d/0x5e0 [ 419.920602] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 419.926005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.930873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.936067] RIP: 0033:0x456ef7 [ 419.939278] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.958181] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 419.965879] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 419.973192] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 419.980451] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 419.987724] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 419.994978] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000013 13:48:19 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfatp', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:19 executing program 5 (fault-call:2 fault-nth:20): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2000000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 420.425781] FAULT_INJECTION: forcing a failure. [ 420.425781] name failslab, interval 1, probability 0, space 0, times 0 [ 420.437084] CPU: 0 PID: 29542 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 420.444105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.453485] Call Trace: [ 420.456088] dump_stack+0x1c9/0x2b4 [ 420.459742] ? dump_stack_print_info.cold.2+0x52/0x52 [ 420.464979] should_fail.cold.4+0xa/0x11 [ 420.469112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 420.474244] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 420.479288] ? widen_string+0xe0/0x2e0 [ 420.483204] ? rcu_note_context_switch+0x730/0x730 [ 420.488167] ? graph_lock+0x170/0x170 [ 420.492012] ? find_held_lock+0x36/0x1c0 [ 420.496101] ? __lock_is_held+0xb5/0x140 [ 420.500197] ? check_same_owner+0x340/0x340 [ 420.504539] ? graph_lock+0x170/0x170 [ 420.508359] ? rcu_note_context_switch+0x730/0x730 [ 420.513417] __should_failslab+0x124/0x180 [ 420.517667] should_failslab+0x9/0x14 [ 420.521491] kmem_cache_alloc_node+0x272/0x780 [ 420.526095] ? find_held_lock+0x36/0x1c0 [ 420.530183] __alloc_skb+0x119/0x770 [ 420.533920] ? skb_scrub_packet+0x520/0x520 [ 420.538271] ? kasan_check_read+0x11/0x20 [ 420.542438] ? rcu_is_watching+0x8c/0x150 [ 420.546604] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 420.551319] ? netlink_has_listeners+0x2da/0x4c0 [ 420.556097] ? netlink_tap_init_net+0x3e0/0x3e0 [ 420.560814] alloc_uevent_skb+0x89/0x220 [ 420.564895] kobject_uevent_env+0x866/0x1110 [ 420.569330] ? internal_create_group+0x347/0x970 [ 420.574113] kobject_uevent+0x1f/0x30 [ 420.577982] lo_ioctl+0x138e/0x1d90 [ 420.581639] ? lo_rw_aio_complete+0x450/0x450 [ 420.586160] blkdev_ioctl+0x9cd/0x2030 [ 420.590067] ? blkpg_ioctl+0xc40/0xc40 [ 420.593990] ? kasan_check_read+0x11/0x20 [ 420.598169] ? rcu_is_watching+0x8c/0x150 [ 420.602336] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 420.607012] ? __fget+0x4d5/0x740 [ 420.610481] ? ksys_dup3+0x690/0x690 [ 420.614213] ? kasan_check_write+0x14/0x20 [ 420.618464] ? do_raw_spin_lock+0xc1/0x200 [ 420.622725] block_ioctl+0xee/0x130 13:48:19 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) prctl$intptr(0x3b, 0x946) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:19 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe000000) 13:48:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025c3f0a00145f8f764070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000d46000/0x1000)=nil, 0x1000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x2, 0x0) mlock(&(0x7f0000945000/0x4000)=nil, 0x4000) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000084d000/0x2000)=nil) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) mremap(&(0x7f0000bca000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000903000/0x4000)=nil) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x0) 13:48:19 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat`', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:19 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc8070031") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 420.626367] ? blkdev_fallocate+0x400/0x400 [ 420.630703] do_vfs_ioctl+0x1de/0x1720 [ 420.634636] ? rcu_is_watching+0x8c/0x150 [ 420.638797] ? ioctl_preallocate+0x300/0x300 [ 420.643215] ? __fget_light+0x2f7/0x440 [ 420.647203] ? fget_raw+0x20/0x20 [ 420.650664] ? putname+0xf2/0x130 [ 420.654129] ? rcu_read_lock_sched_held+0x108/0x120 [ 420.659160] ? kmem_cache_free+0x25c/0x2d0 [ 420.663423] ? putname+0xf7/0x130 [ 420.666912] ? do_sys_open+0x3cb/0x760 [ 420.670832] ? security_file_ioctl+0x94/0xc0 13:48:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) [ 420.675251] ksys_ioctl+0xa9/0xd0 [ 420.678748] __x64_sys_ioctl+0x73/0xb0 [ 420.682675] do_syscall_64+0x1b9/0x820 [ 420.686587] ? finish_task_switch+0x1d3/0x870 [ 420.691092] ? syscall_return_slowpath+0x5e0/0x5e0 [ 420.696055] ? syscall_return_slowpath+0x31d/0x5e0 [ 420.700996] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 420.706372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.711230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.716437] RIP: 0033:0x456ef7 [ 420.719632] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.738521] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 420.746219] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 420.753493] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 420.760775] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 420.768043] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 420.775303] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000014 13:48:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7400000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:20 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) accept(r0, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000100)=0x80) delete_module(&(0x7f0000000000)='!lo-(!\\vtrusted\x00', 0x800) 13:48:20 executing program 5 (fault-call:2 fault-nth:21): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:20 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ed", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:20 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2127) [ 421.128668] FAULT_INJECTION: forcing a failure. [ 421.128668] name failslab, interval 1, probability 0, space 0, times 0 [ 421.140026] CPU: 1 PID: 29600 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 421.147055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.156420] Call Trace: [ 421.159036] dump_stack+0x1c9/0x2b4 [ 421.162685] ? dump_stack_print_info.cold.2+0x52/0x52 [ 421.168402] should_fail.cold.4+0xa/0x11 [ 421.172483] ? __kernel_text_address+0xd/0x40 [ 421.177007] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 421.182132] ? __save_stack_trace+0x8d/0xf0 [ 421.186499] ? graph_lock+0x170/0x170 [ 421.190322] ? save_stack+0x43/0xd0 [ 421.193970] ? kasan_kmalloc+0xc4/0xe0 [ 421.197880] ? find_held_lock+0x36/0x1c0 [ 421.201968] ? __lock_is_held+0xb5/0x140 [ 421.206061] ? check_same_owner+0x340/0x340 [ 421.210395] ? rcu_note_context_switch+0x730/0x730 [ 421.215345] __should_failslab+0x124/0x180 [ 421.219591] should_failslab+0x9/0x14 [ 421.223405] kmem_cache_alloc_node_trace+0x26f/0x770 [ 421.228539] __kmalloc_node_track_caller+0x33/0x70 [ 421.233492] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 421.238267] __alloc_skb+0x155/0x770 [ 421.242000] ? skb_scrub_packet+0x520/0x520 [ 421.246333] ? kasan_check_read+0x11/0x20 [ 421.250500] ? rcu_is_watching+0x8c/0x150 [ 421.254660] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 421.259350] ? netlink_has_listeners+0x2da/0x4c0 [ 421.264117] ? netlink_tap_init_net+0x3e0/0x3e0 [ 421.268805] alloc_uevent_skb+0x89/0x220 [ 421.272880] kobject_uevent_env+0x866/0x1110 [ 421.277295] ? internal_create_group+0x347/0x970 [ 421.282094] kobject_uevent+0x1f/0x30 [ 421.285909] lo_ioctl+0x138e/0x1d90 [ 421.289569] ? lo_rw_aio_complete+0x450/0x450 [ 421.294076] blkdev_ioctl+0x9cd/0x2030 [ 421.297981] ? blkpg_ioctl+0xc40/0xc40 [ 421.301882] ? kasan_check_read+0x11/0x20 [ 421.306045] ? rcu_is_watching+0x8c/0x150 [ 421.310205] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 421.314896] ? __fget+0x4d5/0x740 [ 421.318392] ? ksys_dup3+0x690/0x690 [ 421.322113] ? kasan_check_write+0x14/0x20 [ 421.326355] ? do_raw_spin_lock+0xc1/0x200 [ 421.330608] block_ioctl+0xee/0x130 [ 421.334254] ? blkdev_fallocate+0x400/0x400 [ 421.338595] do_vfs_ioctl+0x1de/0x1720 [ 421.342490] ? rcu_is_watching+0x8c/0x150 [ 421.346666] ? ioctl_preallocate+0x300/0x300 [ 421.351079] ? __fget_light+0x2f7/0x440 [ 421.355060] ? fget_raw+0x20/0x20 [ 421.358519] ? putname+0xf2/0x130 [ 421.361984] ? rcu_read_lock_sched_held+0x108/0x120 [ 421.367053] ? kmem_cache_free+0x25c/0x2d0 [ 421.371296] ? putname+0xf7/0x130 [ 421.374761] ? do_sys_open+0x3cb/0x760 [ 421.378663] ? security_file_ioctl+0x94/0xc0 [ 421.383081] ksys_ioctl+0xa9/0xd0 [ 421.386549] __x64_sys_ioctl+0x73/0xb0 [ 421.390456] do_syscall_64+0x1b9/0x820 [ 421.394356] ? syscall_slow_exit_work+0x500/0x500 [ 421.399240] ? syscall_return_slowpath+0x5e0/0x5e0 [ 421.404178] ? syscall_return_slowpath+0x31d/0x5e0 [ 421.409120] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 421.414499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.419362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.424580] RIP: 0033:0x456ef7 [ 421.427775] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.446678] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 421.454397] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 421.461667] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 421.468941] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:48:20 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc8070031") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:20 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) read(r2, &(0x7f0000000140)=""/43, 0x2b) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) syz_init_net_socket$llc(0x1a, 0x3, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x101000, 0x8) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000000)='\x00') sendmsg$unix(r3, &(0x7f0000002d80)={&(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000000740)="f10584494a0bf9ba883a9806b7c49018cba293e5529cac95ecc3f6fc98f292cf34955871ccab3fbec3c91e1596ce133b8129e8c0c1af1ec465fd5d78549cdc6b8a", 0x41}, {&(0x7f0000001800)="d52e07fb0a19af907b66e1f084fa0c20b216e414a2100446a83c51b62bc01597b57b47b07def912d0390405f1d079bee9277f858513cb665f6fd1ef3982f9b7741fc1a7f6f0e8aa433ecc0937c914e2946b30fb329beb9b52e5a2be0e4359b6c376bdfd07b6f2cdf21956655d93fbc5298b6aaffdcdc27e6db20655d708d8de4a6ef6a43e098592750335201082f9e42b7c674cc788d7ff85ba2ab48e08390749066c79979ed88bbbe8dd43d64618ab2194b36d384244ab560eb52fc81890e2bc74384e80ef86fb8a06939e7b9eb81", 0xcf}, {&(0x7f0000001900)="a88cebe4410542f0b3636682422c57e6fda843ad9701cb723f70878fc0d7cc21f46bdedd19d12eb3218ea25b6a97024db9107b65a81ea1f085a85611a7b8e0c1519eea37c52c7a4bafb2793693956d52d8ba495b637e326058c8a592f1402acfe207093d4fd67e2186c524d7f2c2234007973ba89f88ddc8cbc789d1eaf33746952f70b7", 0x84}, {&(0x7f00000019c0)="f184f8c604361690ef1e717ba48ce07e666a95e582ecfd3a461c62cf7917cbde4693caa737aaddbcdf559640eb05f87a1fcf8f04d9e9fe2e4a040c54cdb731759c8aa246477a0691617d5eff81a171d583542efb338efba89f7430c3ee50883e1b3f1af2f867daddacfa9ca687b269b5b5ae4fdcaff2a3f77c3d53bfc2f1e568acb4a2dd9a55ebf2", 0x88}, {&(0x7f0000001a80)="fe4f0835df48554dbb784119c7732bd68e6d926d64b2f5c87be1fd12411fc44d9ad38d2ab2d6d36eefbf0e58762e7fc3e363f7fbe8ea16bd7edde947172b012bcd4a5872715d33310f3fca45d9277bc0ef8450361f597aca53eb97da274ab1f77a21c5cc066dec14ef9a01a500da83e5f0265ca1a5fd013265a8321382b9c8664d913a896640035866e84bff4337420502851db5902727a3bc4c11420294efc264124d68a9f9e1d7d3", 0xa9}, {&(0x7f0000001b40)="3f45cb4e564def9227bc5d711ded839c0985766f461e8cc4db42d5a8894a35c3d9c82fd7158c12293f5a2704de800fdf692a67e00b54013e5d7d685fb0a570cc38242c7662a49c8363d94f91d613ad4c3c80879e6ca8969f5a4b0db8df06a4e6c9f32da9391dcbc895b5d8a3f8f90459c5a93c03919d28e67ff52070839cb8455f9cf4390f846e57b2746836bfc1ec419867a1f5c248cc72ef6aa08b7ff76597d5c8f8b0aab7b82f9a78b44ee79575c20d72300d79683331e737ebccb93ada7a58b2f46ba5", 0xc5}, {&(0x7f0000001c40)="fedf9e35210da391f66c3c03283df66b8c04c046ed86dabbb9d9cc637b1a0438c800b6e18bb30ae01fde94b1891bbf4ce18133c2877f6b62de03822d64d1c96d4f9c3e271a689cf701b802690c56ee899731b09a263de47754", 0x59}, {&(0x7f0000001cc0)="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", 0x1000}], 0x8, &(0x7f0000002d40), 0x0, 0x20048805}, 0x10) dup2(r0, r2) syz_open_dev$audion(&(0x7f00000007c0)='/dev/audio#\x00', 0x0, 0x0) tkill(r1, 0x1000000000015) 13:48:20 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 421.476211] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 421.483481] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000015 13:48:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x12000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:20 executing program 5 (fault-call:2 fault-nth:22): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:20 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x2000800) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000005efff)='/dev/ptmx\x00', 0x8000, 0x0) r1 = epoll_create(0x6) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x200000) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f00000000c0)) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)) 13:48:20 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:20 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc8070031") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 421.869262] FAULT_INJECTION: forcing a failure. [ 421.869262] name failslab, interval 1, probability 0, space 0, times 0 [ 421.880684] CPU: 0 PID: 29648 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 421.887715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.897090] Call Trace: [ 421.899702] dump_stack+0x1c9/0x2b4 [ 421.903349] ? dump_stack_print_info.cold.2+0x52/0x52 [ 421.908575] should_fail.cold.4+0xa/0x11 [ 421.912689] ? fault_create_debugfs_attr+0x1f0/0x1f0 13:48:21 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000002c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=""/57, 0x39}, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000680)={'vcan0\x00', r1}) connect$can_bcm(r0, &(0x7f0000000500)={0x1d, r2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000001a00)='net/psched\x00') ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e19a2b010000037dc1250200000008990039966a7d5cb2bd00000000000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000000480)=[{{&(0x7f0000000200)=@nfc, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f00000003c0)=""/91, 0x48}, {&(0x7f0000000040)=""/28, 0x20a}, {&(0x7f0000000280)}, {&(0x7f0000000540)=""/253, 0xc2}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000002000)=""/4096, 0x1000}], 0x7, &(0x7f0000001740)=""/223, 0xdf, 0x15}, 0xffff}], 0x1, 0x2, &(0x7f0000000640)={0x0, 0x1c9c380}) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f00000001c0), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{0x3}, 0x0, 0x0, 0x0, 0x0, "9e2bdeefaf92d92bd8f41d356221a9fe7f8a66fea837a21005db0dcd0630bf89dc773678e2876878856b76b55a7478c2e2d9c3f25b4678e6ab366fc67b080974"}, 0x48}}, 0x0) r4 = getpid() ptrace$setregs(0xffffffffffffffff, r4, 0x9, &(0x7f0000001840)="761d93457c70f0c31327c728afc212492756d3722d4de265a2c0397d7f959b6c7f24821815416e09f5c7f6f13823f6c50669d9abc9a0ed0987db6341bfca3a89afb04341ec670fb76e64fc63ac95600bb99a23fd27cbc08dfbd88f480a48b348ce2aa04648a6c95c3f4c569dfcc8e991f54372984e22e8a0eea97cc0a2b4d104bbeca713e7f7258cf5f457edb9d3571a99646ed3e4f9de3ae23467e95e0544a9b4044fd8cd5b479cd7bec7580178b1bed35638fe71f95df1c8c9d31eb620aecf5bae5132f3a6851e9245df069cf7137411cd7eb87379663c0c1564b882af49ca751355765bff7e179268df") stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000001a40)={@loopback, 0x4, 0x2, 0xff, 0x4, 0xfffffffffffffff7, 0x80000000, 0x8}, 0x20) chown(&(0x7f0000000280)='./file0\x00', r5, r6) [ 421.917822] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 421.922512] ? is_bpf_text_address+0xd7/0x170 [ 421.927045] ? graph_lock+0x170/0x170 [ 421.930864] ? __kernel_text_address+0xd/0x40 [ 421.935388] ? find_held_lock+0x36/0x1c0 [ 421.939498] ? __lock_is_held+0xb5/0x140 [ 421.943598] ? check_same_owner+0x340/0x340 [ 421.947946] ? block_ioctl+0xee/0x130 [ 421.951763] ? do_vfs_ioctl+0x1de/0x1720 [ 421.955841] ? ksys_ioctl+0xa9/0xd0 [ 421.959490] ? rcu_note_context_switch+0x730/0x730 [ 421.964451] __should_failslab+0x124/0x180 [ 421.968712] should_failslab+0x9/0x14 [ 421.972535] kmem_cache_alloc+0x2af/0x760 [ 421.976719] skb_clone+0x1be/0x500 [ 421.980277] ? refcount_add_not_zero_checked+0x280/0x330 [ 421.985747] ? skb_split+0x11f0/0x11f0 [ 421.989660] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 421.994699] ? netlink_trim+0x1ba/0x380 [ 421.998707] ? netlink_skb_destructor+0x210/0x210 [ 422.003588] netlink_broadcast_filtered+0x10bc/0x1630 [ 422.008807] ? __netlink_sendskb+0xd0/0xd0 [ 422.013067] ? kasan_check_read+0x11/0x20 [ 422.017223] ? rcu_is_watching+0x8c/0x150 [ 422.021389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.026961] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 422.032427] ? refcount_add_not_zero_checked+0x330/0x330 [ 422.037887] ? netlink_has_listeners+0x2da/0x4c0 [ 422.042651] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 422.047682] netlink_broadcast+0x3a/0x50 [ 422.051755] kobject_uevent_env+0x829/0x1110 [ 422.056667] ? internal_create_group+0x347/0x970 [ 422.061442] kobject_uevent+0x1f/0x30 [ 422.065254] lo_ioctl+0x138e/0x1d90 [ 422.068895] ? lo_rw_aio_complete+0x450/0x450 [ 422.073416] blkdev_ioctl+0x9cd/0x2030 [ 422.077355] ? blkpg_ioctl+0xc40/0xc40 [ 422.081268] ? kasan_check_read+0x11/0x20 [ 422.085432] ? rcu_is_watching+0x8c/0x150 [ 422.089607] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 422.094316] ? __fget+0x4d5/0x740 [ 422.097800] ? ksys_dup3+0x690/0x690 [ 422.101534] ? kasan_check_write+0x14/0x20 [ 422.105771] ? do_raw_spin_lock+0xc1/0x200 [ 422.110018] block_ioctl+0xee/0x130 [ 422.113650] ? blkdev_fallocate+0x400/0x400 [ 422.117986] do_vfs_ioctl+0x1de/0x1720 [ 422.121898] ? rcu_is_watching+0x8c/0x150 [ 422.126074] ? ioctl_preallocate+0x300/0x300 [ 422.130502] ? __fget_light+0x2f7/0x440 [ 422.134484] ? fget_raw+0x20/0x20 [ 422.137957] ? putname+0xf2/0x130 [ 422.141419] ? rcu_read_lock_sched_held+0x108/0x120 [ 422.146453] ? kmem_cache_free+0x25c/0x2d0 [ 422.150699] ? putname+0xf7/0x130 [ 422.154158] ? do_sys_open+0x3cb/0x760 [ 422.158055] ? security_file_ioctl+0x94/0xc0 [ 422.162475] ksys_ioctl+0xa9/0xd0 [ 422.165949] __x64_sys_ioctl+0x73/0xb0 [ 422.169846] do_syscall_64+0x1b9/0x820 [ 422.173739] ? finish_task_switch+0x1d3/0x870 [ 422.178250] ? syscall_return_slowpath+0x5e0/0x5e0 [ 422.183186] ? syscall_return_slowpath+0x31d/0x5e0 [ 422.188124] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 422.193501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.198357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.203550] RIP: 0033:0x456ef7 [ 422.206767] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.225678] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.233392] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000456ef7 [ 422.240663] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 422.247932] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 422.255228] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 422.262500] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000016 13:48:21 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:21 executing program 5 (fault-call:2 fault-nth:23): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:21 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000) 13:48:21 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x23}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:21 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f8571") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:21 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:21 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4a9) [ 422.599238] FAULT_INJECTION: forcing a failure. [ 422.599238] name failslab, interval 1, probability 0, space 0, times 0 [ 422.610884] CPU: 1 PID: 29693 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 422.617919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.627292] Call Trace: [ 422.629902] dump_stack+0x1c9/0x2b4 [ 422.633563] ? dump_stack_print_info.cold.2+0x52/0x52 [ 422.638768] ? trace_hardirqs_on+0x10/0x10 [ 422.643034] should_fail.cold.4+0xa/0x11 [ 422.647126] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 422.652253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.657808] ? walk_component+0x3fe/0x2630 [ 422.662076] ? graph_lock+0x170/0x170 [ 422.665892] ? print_usage_bug+0xc0/0xc0 [ 422.669986] ? graph_lock+0x170/0x170 [ 422.673808] ? trace_hardirqs_on+0x10/0x10 [ 422.678067] ? find_held_lock+0x36/0x1c0 [ 422.682160] ? __lock_is_held+0xb5/0x140 [ 422.686253] ? check_same_owner+0x340/0x340 [ 422.690590] ? rcu_note_context_switch+0x730/0x730 [ 422.695553] __should_failslab+0x124/0x180 [ 422.699819] should_failslab+0x9/0x14 [ 422.703641] kmem_cache_alloc+0x2af/0x760 [ 422.707799] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 422.712495] __d_alloc+0xc8/0xd50 [ 422.715967] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 422.721007] ? d_alloc_parallel+0x1eb0/0x1eb0 [ 422.725545] ? lock_release+0xa30/0xa30 [ 422.729526] ? mark_held_locks+0xc9/0x160 [ 422.733680] ? filename_create+0x1b2/0x5b0 [ 422.737935] ? d_lookup+0x269/0x340 [ 422.741581] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 422.746610] d_alloc+0x96/0x380 [ 422.749894] ? __d_lookup+0x9e0/0x9e0 [ 422.753715] ? __d_alloc+0xd50/0xd50 [ 422.757450] __lookup_hash+0xd9/0x190 [ 422.761264] filename_create+0x1e5/0x5b0 [ 422.765350] ? kern_path_mountpoint+0x40/0x40 [ 422.769853] ? fget_raw+0x20/0x20 [ 422.773311] ? putname+0xf2/0x130 [ 422.776780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.782323] ? getname_flags+0x26e/0x5a0 [ 422.786391] do_mkdirat+0xda/0x310 [ 422.789973] ? __ia32_sys_mknod+0xb0/0xb0 [ 422.794133] ? ksys_ioctl+0x81/0xd0 [ 422.797782] __x64_sys_mkdir+0x5c/0x80 [ 422.801688] do_syscall_64+0x1b9/0x820 [ 422.805596] ? syscall_return_slowpath+0x5e0/0x5e0 [ 422.810526] ? syscall_return_slowpath+0x31d/0x5e0 [ 422.815477] ? __switch_to_asm+0x34/0x70 [ 422.819545] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 422.824914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.829774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.834963] RIP: 0033:0x4564c7 [ 422.838161] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.857061] RSP: 002b:00007f4fa7b39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 422.864806] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 422.872075] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 422.879345] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 422.886624] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 13:48:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7a000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 422.893894] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000017 13:48:22 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:22 executing program 2: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:22 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) r3 = fcntl$dupfd(r1, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0xfffffffffffffffc}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)={r4, 0xfffffffffffffffe}, &(0x7f0000000180)=0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000012000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x0, 0x5fd, 0xe1, &(0x7f0000000980)="57b18ea7b415ed940b8169989caa3592a560a6f0a3a79bc1f0f2ee25c14dc1bf376df3ec7d3d10b31046815c4ae7507d39bc82dbe8f69b703d8a7a1464487ba0b417de0d921f109f975bbfbff2cd6a223d48746c4ec1ce76e79c11a513cfeca8bdf1e4c8be96f3137acc3e5a1d2a6028443a9a4b6dec6a2e7ecb4887c8e8dee019faf571fa9d05d3c8c37298d3f56c15f1d8718e0ec5f3c32225bf1726a3796d10b67b8eaad6453180c1c388a81d04a7b14ddc015558dee4e8be4d08c4f49c441c710523f679023481439f62c9da3d7140199448fc27433032c2784c675da0579a7dfb4c08cf42e0693e06f97f5be88c4d464b31bc7f6fcc9133d77d520f3fabf07fce348dc267f1f37cee7aa45c6d04a564d26958da5d30b543bdec720f711c46a96db350c13a92d217ab0f4e31ae458325d23a9fe7d08af53236ec9dbea3687070c1882ad6a54f90e2cf9787195674312aab18468d5db369a591ec18fc606fb4b3af64ba9daef3d2eeb1dbd3499f4abf4fc259f10dec0aea78c38f07303684605e2d14b2a85a7c2ad36afadd6205b13df806feabf5b950e93d69e839f5cd8d4b8694d5aca99d55aca2f374fcb733b9c64f0b85a183a97bb47cba19a2d3a76cf30a0e8ff241f0d64bc56ee677d8f5a2f3d892ba8460f4e3a51fc7191d18dc047ddc0221ad23c224430f4d8d7c45f8e3033d69bba3c9ce9c4711c8c707299a80d88a775dae68d05c4558fbe87fef1c8449c61a8a19f16bbecf6a8c9d0c24b2f2d5fd813f62ed9af4811f1ba86b3155769fe591e9cb4108d4d9e947713e8d6d5b2083d0334c0a78397fe7d4d2926d2aec17a6d74a370eb39ec48eb428ec6430ae26c0d2602d34226835d23d2d964e8e06d05ba4520c565f9fe5c01472289509d6b8b33b409602c1fd516bd50e7658ad6f40e33a150a4d189807a4e8cf435803b9c91b05991dbb9550aca9fc5cb5a4180bd5bff3e3977a1f84f1be480643e95ff1abab17ca1c95972447f3d7d84302fbeca78e557b7b5d706fa2934c36ce56b80e9ce84a8c578a33bda617b89b0f8a2ecddcef6b10e7a1e7e44903267331f6b2089a7fcc1392e8fa4f5d0a9970e50cd14bcdb58bcdb58d4cb91a9261c0dc1b3339f64fea11041b26ec026fcd55784995f30c69457d66a61dcdb6f96c83050c89eff49a329ab80d227212e0e2c6cd261abaa16cb58db3bcd7096c566427e1d2191b6be5da650d9effa71ab20858855969d512f8292b3b8b64d8acf3bfb03d076ad5af3d0ef41446e932b791d062a3d7da8dfc8aeddb27668db630885872cd1ac01ee0026b65ecb09da97bd63b70e999cd35e474334c267a6ffef63d9515581614cdbe8524ae80466df273a39a1c4fe2331f416d0409d8099f819c0b82de0879865c4ad5a20823d6da9a430c8e2a99d407f606a3e7f68211db1dfa1000f191dc18795471c518ba84f794873d77232b64af7957a5056d973c63afcb18233b448c79c456dc447e0fa663987f8878d998d2bd271288096f71f8ffcb0cc989ea6e554d13cf0e8bf3a028ca61dc0486e8c8fef08c2d5d56d56387a96a83daa8eaf067a6f24519c963f584181c62673fe416fe5662e28670f357795dcf11a750157c374c3ed293378c18d580e5f7c89c2be1927e09bb4127da351d1ac31bfe030fef1132fb10ccbe39e6a09f0c9d055aebdff707d8c4b84da2739f4e61372fff28d41947f3f5b7d5618049e3a5d1346a2c64e71ce42963d83005e0e553b38716c3b159b9ebd27cad9a0c9906f0ed7119f936b5e9c73f85ebad563c6fe13e2bdcd1829c8dd1110c3c05b2176187c6f76cb595a9e8ee3948545c92d909e853d043ba0c8a565a246f7021032e60aba2a3f1673e40792052ac58c0db7f15052ccbbf472f51e05a105d1461faa5b6a6e3c46498759d2229023b1f7295880d14640378b7df7b068a0cfa71e8be5ed607741d4b8ef6c1b374a8d1e77ff1423d32afc3271cff49384db1cd97740f7d665f3fdefdc95e122a58a818109e3336a237de634ca1376a8273a4eddbdfe858902da4fec5d03609cbd467c55972f6bdaa0c63022c3cbef91372bd9e1d5b4173476914408784813eef5aeb1fe210ede421909991e5a834cebdcc213857ec77ee129ce483e9b99a8be6b576bf58d500994f367845e4e614", &(0x7f0000000100)=""/225, 0x1}, 0x28) sendmmsg$unix(r1, &(0x7f0000000180), 0x0, 0x2) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) kcmp(r0, r0, 0x7, r1, r2) 13:48:22 executing program 5 (fault-call:2 fault-nth:24): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:22 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f8571") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 423.091451] FAULT_INJECTION: forcing a failure. [ 423.091451] name failslab, interval 1, probability 0, space 0, times 0 [ 423.103394] CPU: 1 PID: 29725 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 423.110432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.119812] Call Trace: [ 423.122423] dump_stack+0x1c9/0x2b4 [ 423.126092] ? dump_stack_print_info.cold.2+0x52/0x52 [ 423.131312] ? __lock_is_held+0xb5/0x140 [ 423.135415] ? find_held_lock+0x36/0x1c0 [ 423.139549] should_fail.cold.4+0xa/0x11 [ 423.143725] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.148848] ? rcu_note_context_switch+0x730/0x730 [ 423.153795] ? kasan_check_write+0x14/0x20 [ 423.158050] ? __brelse+0x104/0x180 [ 423.161696] ? block_commit_write+0x30/0x30 [ 423.166570] ? graph_lock+0x170/0x170 [ 423.170392] ? __ext4_handle_dirty_metadata+0x1e8/0x590 [ 423.175780] ? kasan_check_write+0x14/0x20 [ 423.180022] ? ext4_mark_iloc_dirty+0x1a09/0x2f90 [ 423.184878] ? __lock_is_held+0xb5/0x140 [ 423.188979] ? check_same_owner+0x340/0x340 [ 423.193313] ? rcu_note_context_switch+0x730/0x730 [ 423.198251] __should_failslab+0x124/0x180 [ 423.202496] should_failslab+0x9/0x14 [ 423.206311] __kmalloc+0x2c8/0x760 [ 423.209866] ? ext4_find_extent+0x775/0xa10 [ 423.214200] ext4_find_extent+0x775/0xa10 [ 423.218375] ext4_ext_map_blocks+0x293/0x62e0 [ 423.222876] ? perf_trace_lock+0x920/0x920 [ 423.227128] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 423.231980] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 423.237011] ? find_held_lock+0x36/0x1c0 [ 423.241083] ? graph_lock+0x170/0x170 [ 423.244888] ? graph_lock+0x170/0x170 [ 423.248709] ? lock_downgrade+0x8f0/0x8f0 [ 423.252870] ? lock_acquire+0x1e4/0x540 [ 423.256876] ? ext4_map_blocks+0x480/0x1b60 [ 423.261208] ? lock_release+0xa30/0xa30 [ 423.265194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.270736] ? ext4_es_lookup_extent+0x465/0xde0 [ 423.275495] ? rcu_note_context_switch+0x730/0x730 [ 423.280452] ? down_read+0xb5/0x1d0 [ 423.284085] ? ext4_map_blocks+0x480/0x1b60 [ 423.288411] ? __down_interruptible+0x700/0x700 [ 423.293093] ? kernel_text_address+0x79/0xf0 [ 423.297510] ext4_map_blocks+0xe31/0x1b60 [ 423.301680] ? __save_stack_trace+0x8d/0xf0 [ 423.306024] ? ext4_issue_zeroout+0x190/0x190 [ 423.310526] ? save_stack+0x43/0xd0 [ 423.314154] ? __kasan_slab_free+0x11a/0x170 [ 423.318566] ? kmem_cache_free+0x86/0x2d0 [ 423.322721] ext4_getblk+0x10e/0x630 [ 423.326447] ? ext4_iomap_begin+0x1350/0x1350 [ 423.330959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.336501] ? __dquot_initialize+0x61d/0xde0 [ 423.341020] ext4_bread+0x95/0x2b0 [ 423.344565] ? ext4_getblk+0x630/0x630 [ 423.348456] ? dquot_get_next_dqblk+0x180/0x180 [ 423.353134] ? debug_check_no_obj_freed+0x30b/0x595 [ 423.358150] ? kasan_check_write+0x14/0x20 [ 423.362406] ext4_append+0x14e/0x370 [ 423.366134] ext4_mkdir+0x532/0xe60 [ 423.369774] ? ext4_init_dot_dotdot+0x510/0x510 [ 423.374465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.380021] ? security_inode_permission+0xd2/0x100 [ 423.385042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.390583] ? security_inode_mkdir+0xe8/0x120 [ 423.395175] vfs_mkdir+0x42e/0x6b0 [ 423.398721] do_mkdirat+0x27b/0x310 [ 423.402351] ? __ia32_sys_mknod+0xb0/0xb0 [ 423.406503] ? ksys_ioctl+0x81/0xd0 [ 423.410141] __x64_sys_mkdir+0x5c/0x80 [ 423.414048] do_syscall_64+0x1b9/0x820 [ 423.417942] ? finish_task_switch+0x1d3/0x870 [ 423.422452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 423.427389] ? syscall_return_slowpath+0x31d/0x5e0 [ 423.432326] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 423.437697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.442546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.447762] RIP: 0033:0x4564c7 [ 423.450982] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.469880] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 423.477609] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 423.484888] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 423.492158] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 423.499426] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 423.506699] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000018 13:48:22 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000001c0)=0x5, 0x4) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bridge_slave_0\x00') write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0x17) write$P9_RREADLINK(r1, &(0x7f0000000200)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) set_robust_list(&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x7, &(0x7f0000000140)}, 0x18) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000002, 0x2011, r1, 0x0) 13:48:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:22 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffff4) 13:48:22 executing program 5 (fault-call:2 fault-nth:25): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7200}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:22 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:22 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f8571") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 423.862216] FAULT_INJECTION: forcing a failure. [ 423.862216] name failslab, interval 1, probability 0, space 0, times 0 [ 423.873588] CPU: 1 PID: 29767 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 423.880609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.889966] Call Trace: [ 423.892578] dump_stack+0x1c9/0x2b4 [ 423.896234] ? dump_stack_print_info.cold.2+0x52/0x52 [ 423.901442] ? trace_hardirqs_on+0x10/0x10 [ 423.905693] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 423.910549] should_fail.cold.4+0xa/0x11 [ 423.914625] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.919741] ? walk_component+0x3fe/0x2630 [ 423.923989] ? graph_lock+0x170/0x170 [ 423.927808] ? graph_lock+0x170/0x170 [ 423.931615] ? perf_trace_lock+0x920/0x920 [ 423.935871] ? trace_hardirqs_on+0x10/0x10 [ 423.940134] ? find_held_lock+0x36/0x1c0 [ 423.944211] ? __lock_is_held+0xb5/0x140 [ 423.948297] ? check_same_owner+0x340/0x340 [ 423.952627] ? rcu_note_context_switch+0x730/0x730 [ 423.957570] __should_failslab+0x124/0x180 [ 423.961816] should_failslab+0x9/0x14 [ 423.965634] kmem_cache_alloc+0x2af/0x760 [ 423.969789] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 423.974486] __d_alloc+0xc8/0xd50 [ 423.977961] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 423.982994] ? d_alloc_parallel+0x1eb0/0x1eb0 [ 423.987505] ? lock_release+0xa30/0xa30 [ 423.991497] ? mark_held_locks+0xc9/0x160 [ 423.995658] ? filename_create+0x1b2/0x5b0 [ 423.999903] ? d_lookup+0x269/0x340 [ 424.003542] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 424.008568] d_alloc+0x96/0x380 [ 424.011862] ? __d_lookup+0x9e0/0x9e0 [ 424.015671] ? __d_alloc+0xd50/0xd50 [ 424.019420] __lookup_hash+0xd9/0x190 [ 424.023253] filename_create+0x1e5/0x5b0 [ 424.027351] ? kern_path_mountpoint+0x40/0x40 [ 424.031867] ? fget_raw+0x20/0x20 [ 424.035334] ? putname+0xf2/0x130 [ 424.038830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.044374] ? getname_flags+0x26e/0x5a0 [ 424.048456] do_mkdirat+0xda/0x310 [ 424.052011] ? __ia32_sys_mknod+0xb0/0xb0 [ 424.056373] ? ksys_ioctl+0x81/0xd0 [ 424.060008] __x64_sys_mkdir+0x5c/0x80 [ 424.063984] do_syscall_64+0x1b9/0x820 [ 424.067900] ? finish_task_switch+0x1d3/0x870 [ 424.072404] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.077371] ? syscall_return_slowpath+0x31d/0x5e0 [ 424.082308] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.087693] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.092549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.097738] RIP: 0033:0x4564c7 [ 424.100935] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.119848] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 424.127572] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 424.134844] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 424.142118] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 424.149387] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 424.156654] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000019 13:48:23 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000100)={{0x8, 0x1, 0x2, 0xfff, '\x00', 0x800000000000}, 0x4, 0x2, 0x0, r0, 0x6, 0x8, 'syz0\x00', &(0x7f0000000000)=['qppp1@\x00', '\x00', '\x00', "e076626f786e65743100", '\x00', '\'\x00'], 0x16, [], [0x2, 0x100, 0xffffffffffffd637, 0x7fffffff]}) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:23 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:23 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x70) 13:48:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:23 executing program 5 (fault-call:2 fault-nth:26): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:23 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 424.426989] FAULT_INJECTION: forcing a failure. [ 424.426989] name failslab, interval 1, probability 0, space 0, times 0 [ 424.438405] CPU: 0 PID: 29801 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 424.445438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.454798] Call Trace: [ 424.457427] dump_stack+0x1c9/0x2b4 [ 424.461084] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.466295] ? __lock_is_held+0xb5/0x140 [ 424.470369] ? find_held_lock+0x36/0x1c0 [ 424.474452] should_fail.cold.4+0xa/0x11 [ 424.478531] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.483650] ? rcu_note_context_switch+0x730/0x730 [ 424.488589] ? kasan_check_write+0x14/0x20 [ 424.492826] ? __brelse+0x104/0x180 [ 424.496463] ? block_commit_write+0x30/0x30 [ 424.500807] ? graph_lock+0x170/0x170 [ 424.504617] ? __ext4_handle_dirty_metadata+0x1e8/0x590 [ 424.509989] ? kasan_check_write+0x14/0x20 [ 424.514228] ? ext4_mark_iloc_dirty+0x1a09/0x2f90 [ 424.519088] ? __lock_is_held+0xb5/0x140 [ 424.523182] ? check_same_owner+0x340/0x340 [ 424.527522] ? rcu_note_context_switch+0x730/0x730 [ 424.532464] __should_failslab+0x124/0x180 [ 424.536712] should_failslab+0x9/0x14 [ 424.540518] __kmalloc+0x2c8/0x760 [ 424.544075] ? ext4_find_extent+0x775/0xa10 [ 424.548408] ext4_find_extent+0x775/0xa10 [ 424.552581] ext4_ext_map_blocks+0x293/0x62e0 [ 424.557095] ? perf_trace_lock+0x920/0x920 [ 424.561352] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 424.566204] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 424.571240] ? find_held_lock+0x36/0x1c0 [ 424.575334] ? graph_lock+0x170/0x170 [ 424.579143] ? graph_lock+0x170/0x170 [ 424.582972] ? lock_downgrade+0x8f0/0x8f0 [ 424.587139] ? lock_acquire+0x1e4/0x540 [ 424.591118] ? ext4_map_blocks+0x480/0x1b60 [ 424.595466] ? lock_release+0xa30/0xa30 [ 424.599465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.605023] ? ext4_es_lookup_extent+0x465/0xde0 [ 424.609788] ? rcu_note_context_switch+0x730/0x730 [ 424.614731] ? down_read+0xb5/0x1d0 [ 424.618368] ? ext4_map_blocks+0x480/0x1b60 [ 424.622713] ? __down_interruptible+0x700/0x700 [ 424.627390] ? kernel_text_address+0x79/0xf0 [ 424.631811] ext4_map_blocks+0xe31/0x1b60 [ 424.635971] ? __save_stack_trace+0x8d/0xf0 [ 424.640310] ? ext4_issue_zeroout+0x190/0x190 [ 424.644815] ? save_stack+0x43/0xd0 [ 424.648446] ? __kasan_slab_free+0x11a/0x170 [ 424.652862] ? kasan_slab_free+0xe/0x10 [ 424.656837] ? kmem_cache_free+0x86/0x2d0 [ 424.660993] ext4_getblk+0x10e/0x630 [ 424.664723] ? ext4_iomap_begin+0x1350/0x1350 [ 424.669229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.674767] ? __dquot_initialize+0x61d/0xde0 [ 424.679271] ext4_bread+0x95/0x2b0 [ 424.682818] ? ext4_getblk+0x630/0x630 [ 424.686706] ? dquot_get_next_dqblk+0x180/0x180 [ 424.691411] ? debug_check_no_obj_freed+0x30b/0x595 [ 424.696435] ? kasan_check_write+0x14/0x20 [ 424.700682] ext4_append+0x14e/0x370 [ 424.704405] ext4_mkdir+0x532/0xe60 [ 424.708047] ? ext4_init_dot_dotdot+0x510/0x510 [ 424.712723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.718266] ? security_inode_permission+0xd2/0x100 [ 424.723318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.728859] ? security_inode_mkdir+0xe8/0x120 [ 424.733452] vfs_mkdir+0x42e/0x6b0 [ 424.737007] do_mkdirat+0x27b/0x310 [ 424.740643] ? __ia32_sys_mknod+0xb0/0xb0 [ 424.744795] ? ksys_ioctl+0x81/0xd0 [ 424.748428] __x64_sys_mkdir+0x5c/0x80 [ 424.752322] do_syscall_64+0x1b9/0x820 [ 424.756219] ? syscall_slow_exit_work+0x500/0x500 [ 424.761069] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.766007] ? syscall_return_slowpath+0x31d/0x5e0 [ 424.770977] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.776403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.781284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.786478] RIP: 0033:0x4564c7 [ 424.789678] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.808579] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 424.816292] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 13:48:23 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x9, 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r1, r2) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x2, 0x0, 0x4, {0xa, 0x4e24, 0x38, @dev={0xfe, 0x80, [], 0x21}, 0x4}}}, 0x32) [ 424.823580] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 424.830844] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 424.838116] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 424.845385] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000001a 13:48:23 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x400000) 13:48:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xb000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:24 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000180), 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x141240, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000000140)={@local, r4}, 0x14) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f00000001c0)={0x2, 0x10001, 0x1}) poll(&(0x7f0000000200)=[{r2, 0x1c0}, {r3, 0x1190}, {r1, 0x10}], 0x3, 0x40) 13:48:24 executing program 5 (fault-call:2 fault-nth:27): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:24 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:24 executing program 6: r0 = getpid() r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = socket(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f0000000000), 0x4) sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x0, 0x2000000000001, 0x5, 0x100000001, 0x9, 0x2, 0x35}, 0x0) rt_sigsuspend(&(0x7f0000000040), 0x8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) getresgid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) r9 = geteuid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) getgroups(0x7, &(0x7f0000000780)=[0xffffffffffffffff, 0xee00, 0xee01, 0x0, 0xee01, 0xee01, 0x0]) sendmmsg$unix(r3, &(0x7f00000008c0)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)="aa151893e5077e19dae174e730ca9ebb0e78d717bcc87185601a67064e837b8729f30ee60e2f2ec590603d64e09976c287fa64ae57ac9fbf9fdf7f9e36cb9d7c80403adbb98ca8e1bebbe068e8f0af1ee11d1c386f7aca33bc234b79483ed676b7c26e1f47489d6b45f64808eacac1", 0x6f}, {&(0x7f0000000240)="7b012eb9b09c14ff6cb8d87f1b47cbcf3214da30acc1d2adcb7a154edf6b6dcccd3f23f27f0f01109f8a7264f746bace578ab10b5bfa8a55b8586e", 0x22a}], 0x2, &(0x7f00000007c0)=[@cred={0x20, 0x1, 0x2, r0, r5, r6}, @rights={0x18, 0x1, 0x1, [r4, r4]}, @cred={0x20, 0x1, 0x2, r0, r7, r8}, @rights={0x20, 0x1, 0x1, [r3, r4, r3]}, @cred={0x20, 0x1, 0x2, r0, r9, r10}, @cred={0x20, 0x1, 0x2, r0, r11, r12}, @rights={0x38, 0x1, 0x1, [r3, r4, r3, r3, r3, r3, r3, r3, r4]}], 0xf0, 0x4000001}], 0x1, 0xffffffffffffffff) r13 = dup(r4) write$P9_RSTAT(r13, &(0x7f0000000180)=ANY=[], 0x0) 13:48:24 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x79000000) 13:48:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1700000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a), 0x0) close(r0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 13:48:24 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 425.351112] FAULT_INJECTION: forcing a failure. [ 425.351112] name failslab, interval 1, probability 0, space 0, times 0 [ 425.362604] CPU: 0 PID: 29860 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 425.369627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.378985] Call Trace: [ 425.381594] dump_stack+0x1c9/0x2b4 [ 425.385241] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.390462] ? graph_lock+0x170/0x170 [ 425.394298] should_fail.cold.4+0xa/0x11 [ 425.398416] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.403545] ? __lock_is_held+0xb5/0x140 [ 425.407640] ? graph_lock+0x170/0x170 [ 425.411467] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 425.417026] ? __mark_inode_dirty+0x495/0x1550 [ 425.421642] ? __inode_attach_wb+0x13d0/0x13d0 [ 425.426240] ? kasan_check_read+0x11/0x20 [ 425.430406] ? __lock_is_held+0xb5/0x140 [ 425.434509] ? check_same_owner+0x340/0x340 [ 425.438847] ? __dquot_alloc_space+0x4b6/0x8c0 [ 425.443446] ? rcu_note_context_switch+0x730/0x730 [ 425.448390] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 425.453428] __should_failslab+0x124/0x180 [ 425.457680] should_failslab+0x9/0x14 [ 425.461499] kmem_cache_alloc+0x2af/0x760 [ 425.465662] ? percpu_counter_add_batch+0xf2/0x150 [ 425.470615] ext4_mb_new_blocks+0x774/0x4740 [ 425.475045] ? find_held_lock+0x36/0x1c0 [ 425.479133] ? ext4_discard_preallocations+0x13d0/0x13d0 [ 425.484597] ? kasan_check_read+0x11/0x20 [ 425.488760] ? rcu_is_watching+0x8c/0x150 [ 425.492945] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 425.497633] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 425.502326] ? is_bpf_text_address+0xd7/0x170 [ 425.506863] ? kernel_text_address+0x79/0xf0 [ 425.511290] ? __kernel_text_address+0xd/0x40 [ 425.515800] ? unwind_get_return_address+0x61/0xa0 [ 425.520756] ? __save_stack_trace+0x8d/0xf0 [ 425.525105] ? save_stack+0xa9/0xd0 [ 425.528744] ? save_stack+0x43/0xd0 [ 425.532381] ? kasan_kmalloc+0xc4/0xe0 [ 425.536281] ? __kmalloc+0x14e/0x760 [ 425.540017] ? ext4_find_extent+0x775/0xa10 [ 425.544361] ? ext4_ext_map_blocks+0x293/0x62e0 [ 425.549074] ? ext4_map_blocks+0x8f3/0x1b60 [ 425.553402] ? ext4_getblk+0x10e/0x630 [ 425.557337] ? ext4_bread+0x95/0x2b0 [ 425.561058] ? ext4_append+0x14e/0x370 [ 425.564963] ? ext4_mkdir+0x532/0xe60 [ 425.568772] ? vfs_mkdir+0x42e/0x6b0 [ 425.572496] ? do_mkdirat+0x27b/0x310 [ 425.576315] ? __x64_sys_mkdir+0x5c/0x80 [ 425.580384] ? do_syscall_64+0x1b9/0x820 [ 425.584456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.589834] ? save_stack+0xa9/0xd0 [ 425.593465] ? print_usage_bug+0xc0/0xc0 [ 425.597542] ? graph_lock+0x170/0x170 [ 425.601348] ? __lock_is_held+0xb5/0x140 [ 425.605423] ? ext4_bread+0x95/0x2b0 [ 425.609155] ? kasan_check_read+0x11/0x20 [ 425.613321] ? __lock_is_held+0xb5/0x140 [ 425.617447] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.622477] ? __kmalloc+0x5f9/0x760 [ 425.626212] ? ext4_find_extent+0x775/0xa10 [ 425.630559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.636126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.641675] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 425.646720] ext4_ext_map_blocks+0x2dc0/0x62e0 [ 425.651335] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 425.656377] ? block_commit_write+0x30/0x30 [ 425.660745] ? find_held_lock+0x36/0x1c0 [ 425.664819] ? graph_lock+0x170/0x170 [ 425.668631] ? graph_lock+0x170/0x170 [ 425.672443] ? graph_lock+0x170/0x170 [ 425.676248] ? lock_downgrade+0x8f0/0x8f0 [ 425.680424] ? lock_acquire+0x1e4/0x540 [ 425.684412] ? ext4_map_blocks+0x88b/0x1b60 [ 425.688773] ? lock_release+0xa30/0xa30 [ 425.692766] ? check_same_owner+0x340/0x340 [ 425.697105] ? rcu_note_context_switch+0x730/0x730 [ 425.702055] ? down_write+0x8f/0x130 [ 425.705779] ? ext4_map_blocks+0x88b/0x1b60 [ 425.710116] ? down_read+0x1d0/0x1d0 [ 425.713866] ext4_map_blocks+0x8f3/0x1b60 [ 425.718022] ? __save_stack_trace+0x8d/0xf0 [ 425.722371] ? ext4_issue_zeroout+0x190/0x190 [ 425.726879] ? save_stack+0x43/0xd0 [ 425.730515] ? __kasan_slab_free+0x11a/0x170 [ 425.734946] ? kasan_slab_free+0xe/0x10 [ 425.738943] ? kmem_cache_free+0x86/0x2d0 [ 425.743106] ext4_getblk+0x10e/0x630 [ 425.746837] ? ext4_iomap_begin+0x1350/0x1350 [ 425.751355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.756902] ? __dquot_initialize+0x61d/0xde0 [ 425.761426] ext4_bread+0x95/0x2b0 [ 425.765001] ? ext4_getblk+0x630/0x630 [ 425.768977] ? dquot_get_next_dqblk+0x180/0x180 [ 425.773697] ? debug_check_no_obj_freed+0x30b/0x595 [ 425.778823] ? kasan_check_write+0x14/0x20 [ 425.783072] ext4_append+0x14e/0x370 [ 425.786812] ext4_mkdir+0x532/0xe60 [ 425.790456] ? ext4_init_dot_dotdot+0x510/0x510 [ 425.795145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.800699] ? security_inode_permission+0xd2/0x100 [ 425.805739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.811291] ? security_inode_mkdir+0xe8/0x120 [ 425.815889] vfs_mkdir+0x42e/0x6b0 [ 425.819491] do_mkdirat+0x27b/0x310 [ 425.823132] ? __ia32_sys_mknod+0xb0/0xb0 [ 425.827294] ? syscall_slow_exit_work+0x500/0x500 [ 425.832146] ? ksys_ioctl+0x81/0xd0 [ 425.835798] __x64_sys_mkdir+0x5c/0x80 [ 425.839712] do_syscall_64+0x1b9/0x820 [ 425.843611] ? finish_task_switch+0x1d3/0x870 [ 425.848129] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.853111] ? syscall_return_slowpath+0x31d/0x5e0 [ 425.858062] ? __switch_to_asm+0x34/0x70 [ 425.862131] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 425.867509] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.872372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.877567] RIP: 0033:0x4564c7 [ 425.880791] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:48:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x17000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:25 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x300) 13:48:25 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:25 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 425.899706] RSP: 002b:00007f4fa7b39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 425.907438] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 425.914730] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 425.922005] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 425.929278] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 425.936563] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000001b 13:48:25 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x8000000080004) fcntl$lock(r1, 0x7, &(0x7f0000000000)) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000000}) r2 = getpid() epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0x8}) migrate_pages(r2, 0xadf5, &(0x7f0000000080)=0x8, &(0x7f00000000c0)=0x3ff) ptrace$getenv(0x4201, r2, 0x9, &(0x7f0000000040)) 13:48:25 executing program 5 (fault-call:2 fault-nth:28): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 426.093194] FAULT_INJECTION: forcing a failure. [ 426.093194] name failslab, interval 1, probability 0, space 0, times 0 [ 426.104544] CPU: 1 PID: 29893 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 426.111578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.120939] Call Trace: [ 426.123567] dump_stack+0x1c9/0x2b4 [ 426.127259] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.132494] ? graph_lock+0x170/0x170 [ 426.136329] should_fail.cold.4+0xa/0x11 13:48:25 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000100)=0x40) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) sched_getparam(r0, &(0x7f0000000140)) 13:48:25 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174f0", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 426.140418] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.145551] ? __lock_is_held+0xb5/0x140 [ 426.149674] ? graph_lock+0x170/0x170 [ 426.153514] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.159075] ? __mark_inode_dirty+0x495/0x1550 [ 426.164212] ? __inode_attach_wb+0x13d0/0x13d0 [ 426.168815] ? kasan_check_read+0x11/0x20 [ 426.172979] ? __lock_is_held+0xb5/0x140 [ 426.177063] ? check_same_owner+0x340/0x340 [ 426.181395] ? __dquot_alloc_space+0x4b6/0x8c0 [ 426.185986] ? rcu_note_context_switch+0x730/0x730 [ 426.190935] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 426.195972] __should_failslab+0x124/0x180 [ 426.200216] should_failslab+0x9/0x14 [ 426.204028] kmem_cache_alloc+0x2af/0x760 [ 426.208182] ? percpu_counter_add_batch+0xf2/0x150 [ 426.213132] ext4_mb_new_blocks+0x774/0x4740 [ 426.217555] ? find_held_lock+0x36/0x1c0 [ 426.221635] ? ext4_discard_preallocations+0x13d0/0x13d0 [ 426.227098] ? kasan_check_read+0x11/0x20 [ 426.231251] ? rcu_is_watching+0x8c/0x150 [ 426.235417] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 426.240122] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 426.244811] ? is_bpf_text_address+0xd7/0x170 [ 426.249316] ? kernel_text_address+0x79/0xf0 [ 426.253731] ? __kernel_text_address+0xd/0x40 [ 426.258232] ? unwind_get_return_address+0x61/0xa0 [ 426.263171] ? __save_stack_trace+0x8d/0xf0 [ 426.267517] ? save_stack+0xa9/0xd0 [ 426.271155] ? save_stack+0x43/0xd0 [ 426.274787] ? kasan_kmalloc+0xc4/0xe0 [ 426.278681] ? __kmalloc+0x14e/0x760 [ 426.282402] ? ext4_find_extent+0x775/0xa10 [ 426.286734] ? ext4_ext_map_blocks+0x293/0x62e0 [ 426.291408] ? ext4_map_blocks+0x8f3/0x1b60 [ 426.295736] ? ext4_getblk+0x10e/0x630 [ 426.299624] ? ext4_bread+0x95/0x2b0 [ 426.303366] ? ext4_append+0x14e/0x370 [ 426.307259] ? ext4_mkdir+0x532/0xe60 [ 426.311063] ? vfs_mkdir+0x42e/0x6b0 [ 426.314777] ? do_mkdirat+0x27b/0x310 [ 426.318577] ? __x64_sys_mkdir+0x5c/0x80 [ 426.322645] ? do_syscall_64+0x1b9/0x820 [ 426.326707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.332078] ? save_stack+0xa9/0xd0 [ 426.335707] ? print_usage_bug+0xc0/0xc0 [ 426.339774] ? graph_lock+0x170/0x170 [ 426.343578] ? __lock_is_held+0xb5/0x140 [ 426.347656] ? ext4_bread+0x95/0x2b0 [ 426.351389] ? kasan_check_read+0x11/0x20 [ 426.355548] ? __lock_is_held+0xb5/0x140 [ 426.359624] ? rcu_read_lock_sched_held+0x108/0x120 [ 426.364643] ? __kmalloc+0x5f9/0x760 [ 426.368367] ? ext4_find_extent+0x775/0xa10 [ 426.372698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.378242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.383796] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 426.388823] ext4_ext_map_blocks+0x2dc0/0x62e0 [ 426.393428] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 426.398472] ? find_held_lock+0x36/0x1c0 [ 426.402544] ? graph_lock+0x170/0x170 [ 426.406362] ? graph_lock+0x170/0x170 [ 426.410173] ? graph_lock+0x170/0x170 [ 426.413977] ? lock_downgrade+0x8f0/0x8f0 [ 426.418157] ? lock_acquire+0x1e4/0x540 [ 426.422135] ? ext4_map_blocks+0x88b/0x1b60 [ 426.426468] ? lock_release+0xa30/0xa30 [ 426.430480] ? rcu_note_context_switch+0x730/0x730 [ 426.435446] ? down_write+0x8f/0x130 [ 426.439164] ? ext4_map_blocks+0x88b/0x1b60 [ 426.443507] ? down_read+0x1d0/0x1d0 [ 426.447253] ext4_map_blocks+0x8f3/0x1b60 [ 426.451419] ? __save_stack_trace+0x8d/0xf0 [ 426.455762] ? ext4_issue_zeroout+0x190/0x190 [ 426.460263] ? save_stack+0x43/0xd0 [ 426.463889] ? __kasan_slab_free+0x11a/0x170 [ 426.468297] ? kasan_slab_free+0xe/0x10 [ 426.472277] ? kmem_cache_free+0x86/0x2d0 [ 426.476433] ext4_getblk+0x10e/0x630 [ 426.480169] ? ext4_iomap_begin+0x1350/0x1350 [ 426.484674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.490216] ? __dquot_initialize+0x61d/0xde0 [ 426.494723] ext4_bread+0x95/0x2b0 [ 426.498273] ? ext4_getblk+0x630/0x630 [ 426.502162] ? dquot_get_next_dqblk+0x180/0x180 [ 426.506836] ? debug_check_no_obj_freed+0x30b/0x595 [ 426.511867] ? kasan_check_write+0x14/0x20 [ 426.516113] ext4_append+0x14e/0x370 [ 426.519838] ext4_mkdir+0x532/0xe60 [ 426.523483] ? ext4_init_dot_dotdot+0x510/0x510 [ 426.528166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.533707] ? security_inode_permission+0xd2/0x100 [ 426.538728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.544271] ? security_inode_mkdir+0xe8/0x120 [ 426.548860] vfs_mkdir+0x42e/0x6b0 [ 426.552406] do_mkdirat+0x27b/0x310 [ 426.556052] ? __ia32_sys_mknod+0xb0/0xb0 [ 426.560210] ? ksys_ioctl+0x81/0xd0 [ 426.563846] __x64_sys_mkdir+0x5c/0x80 [ 426.567743] do_syscall_64+0x1b9/0x820 [ 426.571638] ? finish_task_switch+0x1d3/0x870 [ 426.576139] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.581078] ? syscall_return_slowpath+0x31d/0x5e0 [ 426.586016] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 426.591390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.596241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.601465] RIP: 0033:0x4564c7 [ 426.604666] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.623603] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 426.631320] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 426.638595] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 13:48:25 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x20001, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x82) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x8}, 0x50) [ 426.645865] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 426.653135] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 426.660408] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000001c 13:48:25 executing program 5 (fault-call:2 fault-nth:29): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x6000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:25 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4a8) 13:48:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="b9c70b0000b802000000ba000000000f300f21bcc42175d08cf6d66a0000c4624d93443a00b9980100000f3265f2410f0866470fe07d001d0000000043d9fe66baf80cb85cc87b8fef66bafc0ced", 0x4e}], 0x1, 0x0, &(0x7f00000002c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0x0, 0x7fffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"6ef240fbaeb9e8b61a00"}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='(keyringposix_acl_access]\x00', 0xffffffffffffff9c}, 0x10) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000280)="0f01ba9d6e360f01ca0f0726d9ff440f20c0663501000000440f22c066660ff13e68e513f40f20d86635200000000f22d8baf80c66b833dd4c8466efbafc0cec0f01cb", 0x43}], 0x1, 0x28, &(0x7f0000000340)=[@cr0={0x0, 0xc0010008}, @efer={0x2, 0xb400}], 0x2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x4e22, @remote}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, &(0x7f00000000c0), 0x33e) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:48:25 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661741e", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 426.837822] FAULT_INJECTION: forcing a failure. [ 426.837822] name failslab, interval 1, probability 0, space 0, times 0 [ 426.849181] CPU: 1 PID: 29918 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 426.856216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.865586] Call Trace: [ 426.868200] dump_stack+0x1c9/0x2b4 [ 426.871853] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.877066] ? rcu_is_watching+0x8c/0x150 [ 426.881232] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 426.885950] should_fail.cold.4+0xa/0x11 [ 426.890043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.895174] ? kernel_text_address+0x79/0xf0 [ 426.899599] ? __kernel_text_address+0xd/0x40 [ 426.904113] ? unwind_get_return_address+0x61/0xa0 [ 426.909163] ? __save_stack_trace+0x8d/0xf0 [ 426.914035] ? graph_lock+0x170/0x170 [ 426.917868] ? save_stack+0xa9/0xd0 [ 426.921524] ? __lock_is_held+0xb5/0x140 [ 426.925611] ? ext4_bread+0x95/0x2b0 [ 426.929363] ? kasan_check_read+0x11/0x20 [ 426.933550] ? check_same_owner+0x340/0x340 [ 426.937891] ? kasan_check_write+0x14/0x20 [ 426.942151] ? rcu_note_context_switch+0x730/0x730 [ 426.947106] __should_failslab+0x124/0x180 [ 426.951366] should_failslab+0x9/0x14 [ 426.955185] __kmalloc+0x2c8/0x760 [ 426.958753] ? ext4_find_extent+0x775/0xa10 [ 426.963104] ext4_find_extent+0x775/0xa10 [ 426.967286] ext4_ext_map_blocks+0x293/0x62e0 [ 426.971864] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 426.976909] ? block_commit_write+0x30/0x30 [ 426.981275] ? find_held_lock+0x36/0x1c0 [ 426.985364] ? graph_lock+0x170/0x170 [ 426.989185] ? graph_lock+0x170/0x170 [ 426.993008] ? graph_lock+0x170/0x170 [ 426.996829] ? lock_downgrade+0x8f0/0x8f0 [ 427.001003] ? graph_lock+0x170/0x170 [ 427.004836] ? lock_acquire+0x1e4/0x540 [ 427.008838] ? ext4_map_blocks+0x88b/0x1b60 [ 427.013190] ? lock_release+0xa30/0xa30 [ 427.017188] ? check_same_owner+0x340/0x340 [ 427.021528] ? rcu_note_context_switch+0x730/0x730 [ 427.026510] ? down_write+0x8f/0x130 [ 427.030253] ? ext4_map_blocks+0x88b/0x1b60 [ 427.034592] ? down_read+0x1d0/0x1d0 [ 427.038338] ext4_map_blocks+0x8f3/0x1b60 [ 427.042510] ? __save_stack_trace+0x8d/0xf0 [ 427.046863] ? ext4_issue_zeroout+0x190/0x190 [ 427.051386] ? save_stack+0x43/0xd0 [ 427.055027] ? __kasan_slab_free+0x11a/0x170 [ 427.059456] ? kasan_slab_free+0xe/0x10 [ 427.063460] ? kmem_cache_free+0x86/0x2d0 [ 427.067630] ext4_getblk+0x10e/0x630 [ 427.071370] ? ext4_iomap_begin+0x1350/0x1350 [ 427.075891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.081451] ? __dquot_initialize+0x61d/0xde0 [ 427.085973] ext4_bread+0x95/0x2b0 [ 427.089535] ? ext4_getblk+0x630/0x630 [ 427.093451] ? dquot_get_next_dqblk+0x180/0x180 [ 427.098136] ? debug_check_no_obj_freed+0x30b/0x595 [ 427.103159] ? kasan_check_write+0x14/0x20 [ 427.107462] ext4_append+0x14e/0x370 [ 427.111203] ext4_mkdir+0x532/0xe60 [ 427.114858] ? ext4_init_dot_dotdot+0x510/0x510 [ 427.119548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.125112] ? security_inode_permission+0xd2/0x100 [ 427.130150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.135703] ? security_inode_mkdir+0xe8/0x120 [ 427.140312] vfs_mkdir+0x42e/0x6b0 [ 427.143880] do_mkdirat+0x27b/0x310 [ 427.147528] ? __ia32_sys_mknod+0xb0/0xb0 [ 427.151695] ? ksys_ioctl+0x81/0xd0 [ 427.155343] __x64_sys_mkdir+0x5c/0x80 [ 427.159252] do_syscall_64+0x1b9/0x820 [ 427.163651] ? syscall_slow_exit_work+0x500/0x500 [ 427.168537] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.173492] ? syscall_return_slowpath+0x31d/0x5e0 [ 427.178446] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 427.183826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.188687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.193892] RIP: 0033:0x4564c7 [ 427.197097] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.216005] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 427.223726] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 427.231020] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 427.238294] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 427.245567] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 427.252923] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000001d 13:48:26 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2678) 13:48:26 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:26 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40001, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x1000, "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"}, &(0x7f0000000100)=0x1008) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001240)={r1, @in={{0x2, 0x4e21}}, 0x200, 0x1, 0x400, 0x9ba, 0x5}, &(0x7f0000000140)=0x98) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x30000, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x7, 0x3, 0x80000001, 0x0, r2}, 0x318) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 13:48:26 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1d00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:26 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffff6) 13:48:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x6000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:26 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) lseek(r2, 0x0, 0x3) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:26 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:26 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7826000000000000) 13:48:26 executing program 5 (fault-call:2 fault-nth:30): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:26 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1700}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:26 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='&\x00', 0xffffffffffffff9c}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x6, 0x8000000002) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000025000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="0f01c86626660ffc99300026640f0b0f4e4234df8e9f00360fc7280fc75e00660f51a9885966b9dd0a00000f320f01cf", 0x30}], 0x1, 0x20, &(0x7f0000000200)=[@cr4={0x1, 0x4}, @vmwrite={0x8, 0x0, 0xfff, 0x0, 0x7f, 0x0, 0x80, 0x0, 0x1}], 0x2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) iopl(0x7) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x4000000001) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000240)=0x4) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000008000000000000000100000000000000", @ANYRES32=r2, @ANYBLOB="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"]) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f000001d000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000040)="66baf80cb8afa4e184ef66bafc0cec660f388183b8b91270c4c1ad73d4ca660f388084822741aace0f30d2edc4c2f931a1b48800000f35360f21b0c4c1e9f809", 0x40}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000340)={@local, 0x4f, r5}) fcntl$addseals(r1, 0x409, 0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:48:26 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:27 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa9040000) [ 428.018532] kvm [30004]: vcpu1, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0xcfc84e1a400 [ 428.059542] kvm [30004]: vcpu1, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0xcfc84e1a400 [ 428.088090] kvm [30004]: vcpu1, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0xcfc84e1a400 [ 428.128583] kvm [30004]: vcpu1, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0xcfc84e1a400 [ 428.149657] kvm [30004]: vcpu1, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0xcfc84e1a400 [ 428.213394] FAULT_INJECTION: forcing a failure. [ 428.213394] name failslab, interval 1, probability 0, space 0, times 0 [ 428.224769] CPU: 1 PID: 30024 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 428.231800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.241157] Call Trace: [ 428.243759] dump_stack+0x1c9/0x2b4 [ 428.247410] ? dump_stack_print_info.cold.2+0x52/0x52 [ 428.252615] ? rcu_is_watching+0x8c/0x150 [ 428.256768] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 428.261454] should_fail.cold.4+0xa/0x11 [ 428.265555] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.270714] ? kernel_text_address+0x79/0xf0 [ 428.275141] ? __kernel_text_address+0xd/0x40 [ 428.279643] ? unwind_get_return_address+0x61/0xa0 [ 428.284581] ? __save_stack_trace+0x8d/0xf0 [ 428.288937] ? graph_lock+0x170/0x170 [ 428.292752] ? save_stack+0xa9/0xd0 [ 428.296431] ? __lock_is_held+0xb5/0x140 [ 428.300503] ? ext4_bread+0x95/0x2b0 [ 428.304227] ? kasan_check_read+0x11/0x20 [ 428.308385] ? check_same_owner+0x340/0x340 [ 428.312721] ? kasan_check_write+0x14/0x20 [ 428.316965] ? rcu_note_context_switch+0x730/0x730 [ 428.321919] __should_failslab+0x124/0x180 [ 428.326173] should_failslab+0x9/0x14 [ 428.329994] __kmalloc+0x2c8/0x760 [ 428.333546] ? ext4_find_extent+0x775/0xa10 [ 428.337878] ext4_find_extent+0x775/0xa10 [ 428.342045] ext4_ext_map_blocks+0x293/0x62e0 [ 428.346560] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 428.351602] ? block_commit_write+0x30/0x30 [ 428.355952] ? find_held_lock+0x36/0x1c0 [ 428.360025] ? graph_lock+0x170/0x170 [ 428.363836] ? graph_lock+0x170/0x170 [ 428.367657] ? graph_lock+0x170/0x170 [ 428.371473] ? lock_downgrade+0x8f0/0x8f0 [ 428.375641] ? graph_lock+0x170/0x170 [ 428.379469] ? lock_acquire+0x1e4/0x540 [ 428.383468] ? ext4_map_blocks+0x88b/0x1b60 [ 428.387808] ? lock_release+0xa30/0xa30 [ 428.391787] ? check_same_owner+0x340/0x340 [ 428.396121] ? rcu_note_context_switch+0x730/0x730 [ 428.401066] ? down_write+0x8f/0x130 [ 428.404785] ? ext4_map_blocks+0x88b/0x1b60 [ 428.409110] ? down_read+0x1d0/0x1d0 [ 428.412835] ext4_map_blocks+0x8f3/0x1b60 [ 428.416989] ? __save_stack_trace+0x8d/0xf0 [ 428.421322] ? ext4_issue_zeroout+0x190/0x190 [ 428.425821] ? save_stack+0x43/0xd0 [ 428.429454] ? __kasan_slab_free+0x11a/0x170 [ 428.433866] ? kasan_slab_free+0xe/0x10 [ 428.437843] ? kmem_cache_free+0x86/0x2d0 [ 428.441998] ext4_getblk+0x10e/0x630 [ 428.445720] ? ext4_iomap_begin+0x1350/0x1350 [ 428.450228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.455767] ? __dquot_initialize+0x61d/0xde0 [ 428.460264] ext4_bread+0x95/0x2b0 [ 428.463810] ? ext4_getblk+0x630/0x630 [ 428.467700] ? dquot_get_next_dqblk+0x180/0x180 [ 428.472378] ? debug_check_no_obj_freed+0x30b/0x595 [ 428.477392] ? kasan_check_write+0x14/0x20 [ 428.481643] ext4_append+0x14e/0x370 [ 428.485364] ext4_mkdir+0x532/0xe60 [ 428.489003] ? ext4_init_dot_dotdot+0x510/0x510 [ 428.493682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.499221] ? security_inode_permission+0xd2/0x100 [ 428.504243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.509786] ? security_inode_mkdir+0xe8/0x120 [ 428.514376] vfs_mkdir+0x42e/0x6b0 [ 428.517953] do_mkdirat+0x27b/0x310 [ 428.521588] ? __ia32_sys_mknod+0xb0/0xb0 [ 428.525771] ? ksys_ioctl+0x81/0xd0 [ 428.529413] __x64_sys_mkdir+0x5c/0x80 [ 428.533336] do_syscall_64+0x1b9/0x820 [ 428.537228] ? finish_task_switch+0x1d3/0x870 [ 428.541728] ? syscall_return_slowpath+0x5e0/0x5e0 [ 428.546665] ? syscall_return_slowpath+0x31d/0x5e0 [ 428.551596] ? __switch_to_asm+0x34/0x70 [ 428.555657] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 428.561027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.565881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.571069] RIP: 0033:0x4564c7 [ 428.574267] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.593169] RSP: 002b:00007f4fa7b39a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 428.600882] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 428.608150] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 428.615419] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 428.622696] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 428.629964] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000001e 13:48:27 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7d00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:27 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:27 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfatt', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:27 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000000000) 13:48:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) unshare(0x20400) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) 13:48:27 executing program 5 (fault-call:2 fault-nth:31): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:27 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r2 = dup3(r1, r1, 0x80000) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000100)="01d0ba93132bb71324367dd6c74502bc271d3b79dddbbc6f1f86a7b9fbb3f3c03e732c1389aa5dce05661e65a720ff26e0bbfe8dab20fce177b6303b00561b27719bbd38131e1d1aee4ccc7342fc739020d09d420a50594dd2ff90a72337b3d7ac08ab252047d55913b3a113d380a0b70061bd9f13279f67bf9f12d6be23c1c08c59f7225da0d993690b680b9a0aca2e3ab87361dfc85ebe582c96ae09b9c11e97ba00e7a28b3bb4e6bc4aa1f6d90704c2986b1f9c9dfc83162d4e9825a8843fef3df56b40d1252cdf08fcbfb7804b4e75af63c684102cce1c6c9762e03e23df8b35dabc8c4735a6f4c7b9813d1dfea2") getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000280)=0x10) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000000)={0x7, 0x9, 0x1, 0x9, 0xfffffffffffeffff, 0xfff}) r3 = dup(r2) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) [ 428.808761] FAULT_INJECTION: forcing a failure. [ 428.808761] name failslab, interval 1, probability 0, space 0, times 0 [ 428.820089] CPU: 1 PID: 30045 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 428.827119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.830952] input: syz0 as /devices/virtual/input/input7 [ 428.836490] Call Trace: [ 428.836600] dump_stack+0x1c9/0x2b4 [ 428.836626] ? dump_stack_print_info.cold.2+0x52/0x52 [ 428.836664] ? graph_lock+0x170/0x170 [ 428.857496] should_fail.cold.4+0xa/0x11 [ 428.861583] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.866702] ? __lock_is_held+0xb5/0x140 [ 428.870818] ? graph_lock+0x170/0x170 [ 428.874651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 428.880210] ? __mark_inode_dirty+0x495/0x1550 [ 428.884814] ? __inode_attach_wb+0x13d0/0x13d0 [ 428.889416] ? kasan_check_read+0x11/0x20 [ 428.893590] ? __lock_is_held+0xb5/0x140 [ 428.897676] ? check_same_owner+0x340/0x340 [ 428.902017] ? __dquot_alloc_space+0x4b6/0x8c0 [ 428.906647] ? rcu_note_context_switch+0x730/0x730 [ 428.911629] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 428.916712] __should_failslab+0x124/0x180 [ 428.920961] should_failslab+0x9/0x14 [ 428.924782] kmem_cache_alloc+0x2af/0x760 [ 428.928940] ? percpu_counter_add_batch+0xf2/0x150 [ 428.933898] ext4_mb_new_blocks+0x774/0x4740 [ 428.938335] ? find_held_lock+0x36/0x1c0 [ 428.942451] ? ext4_discard_preallocations+0x13d0/0x13d0 [ 428.947919] ? kasan_check_read+0x11/0x20 [ 428.952097] ? rcu_is_watching+0x8c/0x150 [ 428.956260] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 428.960943] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 428.965641] ? is_bpf_text_address+0xd7/0x170 [ 428.970152] ? kernel_text_address+0x79/0xf0 [ 428.974578] ? __kernel_text_address+0xd/0x40 [ 428.979095] ? unwind_get_return_address+0x61/0xa0 [ 428.984039] ? __save_stack_trace+0x8d/0xf0 [ 428.988390] ? save_stack+0xa9/0xd0 [ 428.992041] ? save_stack+0x43/0xd0 [ 428.995718] ? kasan_kmalloc+0xc4/0xe0 [ 428.999619] ? __kmalloc+0x14e/0x760 [ 429.003345] ? ext4_find_extent+0x775/0xa10 13:48:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x16000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 429.007679] ? ext4_ext_map_blocks+0x293/0x62e0 [ 429.012370] ? ext4_map_blocks+0x8f3/0x1b60 [ 429.016703] ? ext4_getblk+0x10e/0x630 [ 429.020622] ? ext4_bread+0x95/0x2b0 [ 429.024346] ? ext4_append+0x14e/0x370 [ 429.028242] ? ext4_mkdir+0x532/0xe60 [ 429.032056] ? vfs_mkdir+0x42e/0x6b0 [ 429.035784] ? do_mkdirat+0x27b/0x310 [ 429.039592] ? __x64_sys_mkdir+0x5c/0x80 [ 429.043668] ? do_syscall_64+0x1b9/0x820 [ 429.047741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.053125] ? save_stack+0xa9/0xd0 [ 429.056767] ? print_usage_bug+0xc0/0xc0 [ 429.060850] ? graph_lock+0x170/0x170 [ 429.064665] ? __lock_is_held+0xb5/0x140 [ 429.068742] ? ext4_bread+0x95/0x2b0 [ 429.072491] ? kasan_check_read+0x11/0x20 [ 429.076669] ? __lock_is_held+0xb5/0x140 [ 429.080759] ? rcu_read_lock_sched_held+0x108/0x120 [ 429.085791] ? __kmalloc+0x5f9/0x760 [ 429.089523] ? ext4_find_extent+0x775/0xa10 [ 429.093871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.099431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.105008] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 429.110052] ext4_ext_map_blocks+0x2dc0/0x62e0 [ 429.114668] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 429.119700] ? block_commit_write+0x30/0x30 [ 429.124046] ? find_held_lock+0x36/0x1c0 [ 429.128131] ? graph_lock+0x170/0x170 [ 429.131948] ? graph_lock+0x170/0x170 [ 429.135820] ? graph_lock+0x170/0x170 [ 429.139635] ? lock_downgrade+0x8f0/0x8f0 [ 429.143827] ? lock_acquire+0x1e4/0x540 [ 429.147820] ? ext4_map_blocks+0x88b/0x1b60 [ 429.152167] ? lock_release+0xa30/0xa30 [ 429.156161] ? check_same_owner+0x340/0x340 [ 429.160500] ? rcu_note_context_switch+0x730/0x730 [ 429.165939] ? down_write+0x8f/0x130 [ 429.169670] ? ext4_map_blocks+0x88b/0x1b60 [ 429.174035] ? down_read+0x1d0/0x1d0 [ 429.177802] ext4_map_blocks+0x8f3/0x1b60 [ 429.182000] ? __save_stack_trace+0x8d/0xf0 [ 429.186346] ? ext4_issue_zeroout+0x190/0x190 [ 429.190867] ? save_stack+0x43/0xd0 [ 429.194509] ? __kasan_slab_free+0x11a/0x170 [ 429.198940] ? kasan_slab_free+0xe/0x10 [ 429.202943] ? kmem_cache_free+0x86/0x2d0 [ 429.207113] ext4_getblk+0x10e/0x630 [ 429.210846] ? ext4_iomap_begin+0x1350/0x1350 [ 429.215362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.220917] ? __dquot_initialize+0x61d/0xde0 [ 429.225458] ext4_bread+0x95/0x2b0 [ 429.229016] ? ext4_getblk+0x630/0x630 [ 429.232912] ? dquot_get_next_dqblk+0x180/0x180 [ 429.237611] ? debug_check_no_obj_freed+0x30b/0x595 [ 429.242644] ? kasan_check_write+0x14/0x20 [ 429.246907] ext4_append+0x14e/0x370 [ 429.250655] ext4_mkdir+0x532/0xe60 [ 429.254311] ? ext4_init_dot_dotdot+0x510/0x510 [ 429.259015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.264578] ? security_inode_permission+0xd2/0x100 [ 429.269627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.275193] ? security_inode_mkdir+0xe8/0x120 [ 429.279792] vfs_mkdir+0x42e/0x6b0 [ 429.283374] do_mkdirat+0x27b/0x310 [ 429.287043] ? __ia32_sys_mknod+0xb0/0xb0 [ 429.291214] ? ksys_ioctl+0x81/0xd0 [ 429.294859] __x64_sys_mkdir+0x5c/0x80 [ 429.298770] do_syscall_64+0x1b9/0x820 [ 429.302675] ? finish_task_switch+0x1d3/0x870 [ 429.307188] ? syscall_return_slowpath+0x5e0/0x5e0 [ 429.312132] ? syscall_return_slowpath+0x31d/0x5e0 [ 429.317081] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 429.322475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.327341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.332543] RIP: 0033:0x4564c7 [ 429.335747] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d c0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:48:28 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 429.354672] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 429.362419] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004564c7 [ 429.369749] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 429.377041] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 429.384320] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 429.391608] R13: 0000000000000001 R14: 00000000004c9d2d R15: 000000000000001f 13:48:28 executing program 2: unshare(0x20400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 13:48:28 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661741b", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1f00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:28 executing program 5 (fault-call:2 fault-nth:32): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:28 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x20000) 13:48:28 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 429.639774] FAULT_INJECTION: forcing a failure. [ 429.639774] name failslab, interval 1, probability 0, space 0, times 0 [ 429.651165] CPU: 0 PID: 30091 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 429.658192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.667546] Call Trace: [ 429.670152] dump_stack+0x1c9/0x2b4 [ 429.673814] ? dump_stack_print_info.cold.2+0x52/0x52 [ 429.679023] ? graph_lock+0x170/0x170 [ 429.682868] should_fail.cold.4+0xa/0x11 [ 429.686955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 429.692082] ? find_held_lock+0x36/0x1c0 [ 429.696176] ? lock_downgrade+0x8f0/0x8f0 [ 429.700357] ? find_held_lock+0x36/0x1c0 [ 429.704475] ? check_same_owner+0x340/0x340 [ 429.708820] ? rcu_note_context_switch+0x730/0x730 [ 429.713786] ? dput.part.26+0x276/0x7a0 [ 429.717773] __should_failslab+0x124/0x180 [ 429.722028] should_failslab+0x9/0x14 [ 429.725864] __kmalloc_track_caller+0x2c4/0x760 [ 429.730556] ? strncpy_from_user+0x510/0x510 [ 429.734981] ? strndup_user+0x77/0xd0 [ 429.738798] memdup_user+0x2c/0xa0 [ 429.742354] strndup_user+0x77/0xd0 [ 429.746010] ksys_mount+0x3c/0x140 [ 429.749563] __x64_sys_mount+0xbe/0x150 [ 429.753588] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 429.758626] do_syscall_64+0x1b9/0x820 [ 429.762525] ? finish_task_switch+0x1d3/0x870 [ 429.767034] ? syscall_return_slowpath+0x5e0/0x5e0 [ 429.771992] ? syscall_return_slowpath+0x31d/0x5e0 [ 429.776949] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 429.782339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.787199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.792426] RIP: 0033:0x459aba [ 429.795659] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 429.814576] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 429.822306] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 429.829584] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 429.836884] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 429.844160] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 429.851436] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000020 13:48:29 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:29 executing program 6: r0 = getpid() r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x101, 0x141000) write$UHID_DESTROY(r1, &(0x7f0000000380), 0x4) sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x8a3, 0x2) ioperm(0x100000000, 0x8, 0x800) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getpeername(0xffffffffffffff9c, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000480)=0x80) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000004c0)={0x0, 0x7ff, 0x10000000, 0x0, 0x6, 0x1000}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000540)={r4, @in6={{0xa, 0x4e22, 0x3, @mcast1, 0x8}}}, 0x84) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r5, &(0x7f0000000180), 0x4924924924925a6, 0x0) r7 = dup(r6) sendmmsg$unix(r6, &(0x7f0000000240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000180)="21e56cb18a6f861d71a24196529267ce1121272506034857430953cfdefa3c576f74af1f0e6193587b167b3c390a8544069a1f6e4b10a1b933865ae0b03df7cc3304175172be78aa1251bbc304b5775100e805", 0x53}], 0x0, &(0x7f0000000200)=[@rights={0x18, 0x1, 0x1, [r7]}], 0x18, 0x10}], 0x1, 0x4000000) write$P9_RSTAT(r7, &(0x7f0000000180)=ANY=[], 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000600)={0x8, {{0xa, 0x4e23, 0x0, @mcast1, 0x20}}, {{0xa, 0x4e22, 0x10001, @remote, 0x11a2}}}, 0x108) 13:48:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7b00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:29 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:29 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:29 executing program 5 (fault-call:2 fault-nth:33): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:29 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x3000000) [ 430.106468] FAULT_INJECTION: forcing a failure. [ 430.106468] name failslab, interval 1, probability 0, space 0, times 0 [ 430.117900] CPU: 1 PID: 30120 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 430.124925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.134315] Call Trace: [ 430.136928] dump_stack+0x1c9/0x2b4 [ 430.140610] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.145860] ? graph_lock+0x170/0x170 [ 430.149708] should_fail.cold.4+0xa/0x11 [ 430.153809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.158950] ? find_held_lock+0x36/0x1c0 [ 430.163048] ? lock_downgrade+0x8f0/0x8f0 [ 430.167231] ? find_held_lock+0x36/0x1c0 [ 430.171344] ? check_same_owner+0x340/0x340 [ 430.175693] ? rcu_note_context_switch+0x730/0x730 [ 430.180640] ? dput.part.26+0x276/0x7a0 [ 430.184631] __should_failslab+0x124/0x180 [ 430.188881] should_failslab+0x9/0x14 [ 430.192693] __kmalloc_track_caller+0x2c4/0x760 [ 430.197395] ? strncpy_from_user+0x510/0x510 [ 430.201842] ? strndup_user+0x77/0xd0 [ 430.205660] memdup_user+0x2c/0xa0 [ 430.209213] strndup_user+0x77/0xd0 [ 430.212857] ksys_mount+0x3c/0x140 [ 430.216437] __x64_sys_mount+0xbe/0x150 [ 430.220461] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 430.225525] do_syscall_64+0x1b9/0x820 [ 430.229440] ? finish_task_switch+0x1d3/0x870 [ 430.233958] ? syscall_return_slowpath+0x5e0/0x5e0 [ 430.238903] ? syscall_return_slowpath+0x31d/0x5e0 [ 430.243848] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 430.249230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.254092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.259286] RIP: 0033:0x459aba [ 430.262493] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 430.281403] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 430.289131] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 430.296416] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 13:48:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 430.303692] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 430.310965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 430.318235] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000021 13:48:29 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfatu', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:29 executing program 5 (fault-call:2 fault-nth:34): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:29 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa7040000) 13:48:29 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7000000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 430.513360] FAULT_INJECTION: forcing a failure. [ 430.513360] name failslab, interval 1, probability 0, space 0, times 0 [ 430.524806] CPU: 1 PID: 30150 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 430.531834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.541187] Call Trace: [ 430.543789] dump_stack+0x1c9/0x2b4 [ 430.547426] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.552627] ? graph_lock+0x170/0x170 [ 430.556458] should_fail.cold.4+0xa/0x11 [ 430.560564] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.565671] ? find_held_lock+0x36/0x1c0 [ 430.569745] ? lock_downgrade+0x8f0/0x8f0 [ 430.573906] ? find_held_lock+0x36/0x1c0 [ 430.577993] ? check_same_owner+0x340/0x340 [ 430.582321] ? rcu_note_context_switch+0x730/0x730 [ 430.587255] ? dput.part.26+0x276/0x7a0 [ 430.591238] __should_failslab+0x124/0x180 [ 430.595493] should_failslab+0x9/0x14 [ 430.599319] __kmalloc_track_caller+0x2c4/0x760 [ 430.604000] ? strncpy_from_user+0x510/0x510 [ 430.608411] ? strndup_user+0x77/0xd0 [ 430.612221] memdup_user+0x2c/0xa0 [ 430.615764] strndup_user+0x77/0xd0 [ 430.619403] ksys_mount+0x3c/0x140 [ 430.622955] __x64_sys_mount+0xbe/0x150 [ 430.626937] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 430.631967] do_syscall_64+0x1b9/0x820 [ 430.635868] ? finish_task_switch+0x1d3/0x870 [ 430.640369] ? syscall_return_slowpath+0x5e0/0x5e0 [ 430.645303] ? syscall_return_slowpath+0x31d/0x5e0 [ 430.650243] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 430.655616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.660478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.665673] RIP: 0033:0x459aba [ 430.668874] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 430.687774] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 430.695487] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 430.702772] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 430.710052] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 430.717322] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 430.724603] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000022 13:48:29 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:30 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:30 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:30 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2200000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:30 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:30 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4aa) 13:48:30 executing program 2: socket$inet6(0xa, 0x3, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:30 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:30 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:30 executing program 5 (fault-call:2 fault-nth:35): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:30 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffff0) 13:48:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xb00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:30 executing program 2: socket$inet6(0xa, 0x3, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:30 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:30 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x70000000) [ 431.506346] FAULT_INJECTION: forcing a failure. [ 431.506346] name failslab, interval 1, probability 0, space 0, times 0 [ 431.517643] CPU: 1 PID: 30229 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 431.525020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.534380] Call Trace: [ 431.536982] dump_stack+0x1c9/0x2b4 [ 431.540633] ? dump_stack_print_info.cold.2+0x52/0x52 [ 431.545841] ? __kernel_text_address+0xd/0x40 [ 431.550355] ? unwind_get_return_address+0x61/0xa0 [ 431.555306] should_fail.cold.4+0xa/0x11 [ 431.559394] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 431.564514] ? save_stack+0xa9/0xd0 [ 431.568161] ? kasan_kmalloc+0xc4/0xe0 [ 431.572075] ? __kmalloc_track_caller+0x14a/0x760 [ 431.576935] ? memdup_user+0x2c/0xa0 [ 431.580668] ? strndup_user+0x77/0xd0 [ 431.584494] ? graph_lock+0x170/0x170 [ 431.588329] ? find_held_lock+0x36/0x1c0 [ 431.592429] ? check_same_owner+0x340/0x340 [ 431.596770] ? lock_release+0xa30/0xa30 [ 431.600760] ? check_same_owner+0x340/0x340 [ 431.605100] ? rcu_note_context_switch+0x730/0x730 [ 431.610040] ? __check_object_size+0x9d/0x5f2 [ 431.614561] __should_failslab+0x124/0x180 [ 431.618831] should_failslab+0x9/0x14 [ 431.622653] kmem_cache_alloc_trace+0x2cb/0x780 [ 431.627354] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.632916] ? _copy_from_user+0xdf/0x150 [ 431.637092] copy_mount_options+0x5f/0x380 [ 431.641350] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.646913] ksys_mount+0xd0/0x140 [ 431.650490] __x64_sys_mount+0xbe/0x150 [ 431.654491] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 431.659539] do_syscall_64+0x1b9/0x820 [ 431.663493] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.668454] ? syscall_return_slowpath+0x31d/0x5e0 [ 431.673410] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 431.678811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.683689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.688889] RIP: 0033:0x459aba [ 431.692092] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 431.711002] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 431.718720] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 431.726021] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 431.733306] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 431.740591] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 431.747863] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000023 13:48:31 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:31 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:31 executing program 2: socket$inet6(0xa, 0x3, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x3f00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:31 executing program 5 (fault-call:2 fault-nth:36): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:31 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617402", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:31 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x60) 13:48:31 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000000), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) getsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) [ 432.067680] FAULT_INJECTION: forcing a failure. [ 432.067680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.079545] CPU: 1 PID: 30262 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 432.086556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.095904] Call Trace: [ 432.098507] dump_stack+0x1c9/0x2b4 [ 432.102151] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.107352] ? kasan_check_read+0x11/0x20 [ 432.111512] should_fail.cold.4+0xa/0x11 [ 432.115591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.120715] ? trace_hardirqs_on+0x10/0x10 [ 432.124956] ? perf_trace_lock+0x920/0x920 [ 432.129199] ? retint_kernel+0x10/0x10 [ 432.133102] ? graph_lock+0x170/0x170 [ 432.136918] ? pick_next_entity+0x197/0x390 [ 432.141263] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 432.146111] ? find_held_lock+0x36/0x1c0 [ 432.150183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.155729] ? should_fail+0x246/0xd86 [ 432.159628] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.164748] __alloc_pages_nodemask+0x36e/0xdb0 [ 432.169427] ? kasan_check_read+0x11/0x20 [ 432.173616] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 432.178645] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.183328] ? find_held_lock+0x36/0x1c0 [ 432.187437] ? check_same_owner+0x340/0x340 [ 432.191794] cache_grow_begin+0x91/0x710 [ 432.195880] kmem_cache_alloc+0x689/0x760 [ 432.200050] getname_flags+0xd0/0x5a0 [ 432.203877] user_path_at_empty+0x2d/0x50 [ 432.208036] do_mount+0x17a/0x30e0 [ 432.211615] ? copy_mount_string+0x40/0x40 [ 432.215856] ? rcu_pm_notify+0xc0/0xc0 [ 432.219762] ? copy_mount_options+0x5f/0x380 [ 432.224183] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.229214] ? kmem_cache_alloc_trace+0x616/0x780 [ 432.234070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.239612] ? _copy_from_user+0xdf/0x150 [ 432.243776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.250019] ? copy_mount_options+0x285/0x380 [ 432.254526] ksys_mount+0x12d/0x140 [ 432.258168] __x64_sys_mount+0xbe/0x150 [ 432.262145] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 432.267169] do_syscall_64+0x1b9/0x820 [ 432.271059] ? finish_task_switch+0x1d3/0x870 [ 432.275561] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.280496] ? syscall_return_slowpath+0x31d/0x5e0 [ 432.285440] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 432.290821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.295672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.300864] RIP: 0033:0x459aba [ 432.304078] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 432.322985] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 432.330701] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 432.337971] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 432.345238] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 432.352509] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 432.359787] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000024 13:48:31 executing program 2: ioctl(0xffffffffffffffff, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:31 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x8) 13:48:31 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661741c", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:31 executing program 5 (fault-call:2 fault-nth:37): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:31 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f00000000c0)={{}, "73797a3000000000000000000000000000000000000000000000000000f971ed80fa6843d3bee88bb381f34c00000000000000000000000000000800"}) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x45c) 13:48:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xb}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 432.623073] input: syz1 as /devices/virtual/input/input9 [ 432.667388] FAULT_INJECTION: forcing a failure. [ 432.667388] name failslab, interval 1, probability 0, space 0, times 0 [ 432.670227] input: syz1 as /devices/virtual/input/input10 [ 432.678787] CPU: 0 PID: 30299 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 432.678799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.678810] Call Trace: [ 432.703384] dump_stack+0x1c9/0x2b4 [ 432.707047] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.712287] should_fail.cold.4+0xa/0x11 [ 432.716378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.721507] ? lock_downgrade+0x8f0/0x8f0 [ 432.725670] ? kasan_check_read+0x11/0x20 [ 432.729842] ? rcu_is_watching+0x8c/0x150 [ 432.734015] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.738709] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.743408] ? find_held_lock+0x36/0x1c0 [ 432.747500] ? check_same_owner+0x340/0x340 [ 432.751837] ? rcu_note_context_switch+0x730/0x730 [ 432.756779] ? save_stack+0xa9/0xd0 [ 432.760421] __should_failslab+0x124/0x180 [ 432.764669] should_failslab+0x9/0x14 [ 432.768479] kmem_cache_alloc+0x2af/0x760 [ 432.772698] ? find_held_lock+0x36/0x1c0 [ 432.776821] getname_flags+0xd0/0x5a0 [ 432.780644] user_path_at_empty+0x2d/0x50 [ 432.784819] do_mount+0x17a/0x30e0 [ 432.788374] ? do_raw_spin_unlock+0xa7/0x2f0 [ 432.792810] ? copy_mount_string+0x40/0x40 [ 432.797067] ? rcu_pm_notify+0xc0/0xc0 [ 432.801014] ? copy_mount_options+0x5f/0x380 [ 432.805437] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.810478] ? kmem_cache_alloc_trace+0x616/0x780 [ 432.815388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.820963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.826540] ? copy_mount_options+0x285/0x380 [ 432.831082] ksys_mount+0x12d/0x140 [ 432.834737] __x64_sys_mount+0xbe/0x150 [ 432.838722] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 432.843751] do_syscall_64+0x1b9/0x820 [ 432.847668] ? finish_task_switch+0x1d3/0x870 [ 432.852175] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.857128] ? syscall_return_slowpath+0x31d/0x5e0 [ 432.862075] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 432.867481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.872351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.877545] RIP: 0033:0x459aba [ 432.880749] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 432.899659] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 432.907419] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba 13:48:32 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000100)={0x1f, 0x6, 0x7fff}) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r2, &(0x7f0000000180), 0x4924924924925a6, 0x0) r4 = dup(r3) write$P9_RSTAT(r4, &(0x7f0000000180)=ANY=[], 0x0) 13:48:32 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf0ffffffffffffff) [ 432.914872] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 432.922147] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 432.929432] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 432.936706] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000025 13:48:32 executing program 5 (fault-call:2 fault-nth:38): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:32 executing program 2: ioctl(0xffffffffffffffff, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:32 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:32 executing program 7: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x6) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) 13:48:32 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:32 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x8100000000000000) 13:48:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1c00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 433.359711] input: syz0 as /devices/virtual/input/input11 [ 433.389588] FAULT_INJECTION: forcing a failure. [ 433.389588] name failslab, interval 1, probability 0, space 0, times 0 [ 433.400930] CPU: 1 PID: 30331 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 433.407960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.417324] Call Trace: [ 433.419944] dump_stack+0x1c9/0x2b4 [ 433.423604] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.428829] ? trace_hardirqs_on+0x10/0x10 [ 433.433098] should_fail.cold.4+0xa/0x11 [ 433.437194] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.442372] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 433.447255] ? save_stack+0x43/0xd0 [ 433.450913] ? find_held_lock+0x36/0x1c0 [ 433.455031] ? check_same_owner+0x340/0x340 13:48:32 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 433.459382] ? rcu_note_context_switch+0x730/0x730 [ 433.464342] __should_failslab+0x124/0x180 [ 433.468611] should_failslab+0x9/0x14 [ 433.472481] __kmalloc_track_caller+0x2c4/0x760 [ 433.477168] ? kasan_check_read+0x11/0x20 [ 433.481337] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.485778] ? kstrdup_const+0x66/0x80 [ 433.489695] kstrdup+0x39/0x70 [ 433.492917] kstrdup_const+0x66/0x80 [ 433.496641] alloc_vfsmnt+0x1bb/0x9f0 [ 433.500512] ? mnt_free_id.isra.27+0x60/0x60 [ 433.504955] ? graph_lock+0x170/0x170 [ 433.508786] ? rcu_pm_notify+0xc0/0xc0 [ 433.512687] ? putname+0xf2/0x130 [ 433.516167] ? find_held_lock+0x36/0x1c0 [ 433.520249] ? lock_downgrade+0x8f0/0x8f0 [ 433.524417] ? lock_release+0xa30/0xa30 [ 433.528417] ? mpi_free.cold.1+0x19/0x19 [ 433.532558] vfs_kern_mount.part.34+0x90/0x4e0 [ 433.537157] ? may_umount+0xb0/0xb0 [ 433.540797] ? _raw_read_unlock+0x22/0x30 [ 433.544959] ? __get_fs_type+0x97/0xc0 [ 433.548868] do_mount+0x581/0x30e0 [ 433.552432] ? copy_mount_string+0x40/0x40 [ 433.556696] ? copy_mount_options+0x5f/0x380 [ 433.561121] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.566155] ? kmem_cache_alloc_trace+0x616/0x780 [ 433.571023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.576568] ? copy_mount_options+0x285/0x380 [ 433.581081] ksys_mount+0x12d/0x140 [ 433.584731] __x64_sys_mount+0xbe/0x150 [ 433.588712] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 433.593738] do_syscall_64+0x1b9/0x820 [ 433.597631] ? finish_task_switch+0x1d3/0x870 [ 433.602143] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.607082] ? syscall_return_slowpath+0x31d/0x5e0 [ 433.612028] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 433.617406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.622282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.627481] RIP: 0033:0x459aba [ 433.630687] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 433.649591] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:48:32 executing program 2: ioctl(0xffffffffffffffff, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 433.657310] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 433.664596] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 433.671871] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 433.679143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 433.686437] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000026 [ 433.698890] input: syz0 as /devices/virtual/input/input12 13:48:32 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x3f00) 13:48:32 executing program 7: pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000300)=""/103) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400000000000003}]}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet_sctp(0x2, 0x5, 0x84) shutdown(r2, 0x1) 13:48:32 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:32 executing program 5 (fault-call:2 fault-nth:39): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x4000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:32 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000180)=ANY=[], 0x0) 13:48:32 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f000059dffc), &(0x7f0000000100)=0x4) 13:48:33 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617402", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x11000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 434.374850] FAULT_INJECTION: forcing a failure. [ 434.374850] name failslab, interval 1, probability 0, space 0, times 0 [ 434.386626] CPU: 0 PID: 30405 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 434.393683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.403054] Call Trace: [ 434.405699] dump_stack+0x1c9/0x2b4 [ 434.409391] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.414649] should_fail.cold.4+0xa/0x11 [ 434.418743] ? rcu_note_context_switch+0x730/0x730 [ 434.423703] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 434.428822] ? trace_hardirqs_on+0x10/0x10 [ 434.433083] ? graph_lock+0x170/0x170 [ 434.436912] ? find_held_lock+0x36/0x1c0 [ 434.441004] ? __lock_is_held+0xb5/0x140 [ 434.445126] ? check_same_owner+0x340/0x340 [ 434.449470] ? rcu_note_context_switch+0x730/0x730 [ 434.454422] __should_failslab+0x124/0x180 [ 434.458680] should_failslab+0x9/0x14 [ 434.462544] kmem_cache_alloc_trace+0x2cb/0x780 [ 434.467238] ? kasan_check_write+0x14/0x20 [ 434.471524] ? do_raw_spin_lock+0xc1/0x200 [ 434.475800] sget_userns+0x1cf/0xf20 [ 434.479532] ? kill_litter_super+0x90/0x90 [ 434.483799] ? ns_test_super+0x50/0x50 [ 434.487727] ? destroy_unused_super.part.11+0x110/0x110 [ 434.493142] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 434.497743] ? kasan_check_write+0x14/0x20 [ 434.502018] ? do_raw_spin_lock+0xc1/0x200 [ 434.506465] ? blkdev_get+0xc8/0xb50 [ 434.510206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.515770] ? cap_capable+0x1f9/0x260 [ 434.519689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.525248] ? security_capable+0x99/0xc0 [ 434.529416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.534998] ? ns_capable_common+0x13f/0x170 [ 434.539431] ? kill_litter_super+0x90/0x90 [ 434.543773] sget+0x10b/0x150 [ 434.546907] ? ns_test_super+0x50/0x50 [ 434.550827] mount_bdev+0x111/0x3e0 [ 434.554475] ? vfat_mount+0x40/0x40 [ 434.558122] vfat_mount+0x34/0x40 [ 434.561591] mount_fs+0xae/0x328 [ 434.564985] vfs_kern_mount.part.34+0xdc/0x4e0 [ 434.569605] ? may_umount+0xb0/0xb0 [ 434.573251] ? _raw_read_unlock+0x22/0x30 [ 434.577410] ? __get_fs_type+0x97/0xc0 [ 434.581315] do_mount+0x581/0x30e0 [ 434.584873] ? copy_mount_string+0x40/0x40 [ 434.589124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 434.593908] ? retint_kernel+0x10/0x10 [ 434.597829] ? copy_mount_options+0x1a1/0x380 [ 434.602341] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 434.607215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.612803] ? copy_mount_options+0x285/0x380 [ 434.617325] ksys_mount+0x12d/0x140 [ 434.620998] __x64_sys_mount+0xbe/0x150 [ 434.625012] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 434.630042] do_syscall_64+0x1b9/0x820 [ 434.633961] ? syscall_return_slowpath+0x5e0/0x5e0 [ 434.638904] ? syscall_return_slowpath+0x31d/0x5e0 [ 434.643845] ? __switch_to_asm+0x34/0x70 [ 434.647916] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 434.653308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.658163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.663364] RIP: 0033:0x459aba [ 434.666573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 434.685493] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 434.693229] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 434.700520] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 434.707814] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 434.715110] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 434.722392] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000027 13:48:33 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:33 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) 13:48:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:33 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7fffffffffffffff) 13:48:33 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:33 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r3 = dup(r2) write$P9_RSTAT(r3, &(0x7f0000000100)=ANY=[], 0xeb928982e0ae30ed) 13:48:33 executing program 5 (fault-call:2 fault-nth:40): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1c000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 434.893142] FAULT_INJECTION: forcing a failure. [ 434.893142] name failslab, interval 1, probability 0, space 0, times 0 [ 434.904688] CPU: 0 PID: 30434 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 434.911716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.921072] Call Trace: [ 434.923686] dump_stack+0x1c9/0x2b4 [ 434.927347] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.932596] should_fail.cold.4+0xa/0x11 [ 434.936671] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 434.941803] ? print_usage_bug+0xc0/0xc0 [ 434.945867] ? rcu_is_watching+0x8c/0x150 [ 434.950029] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 434.954726] ? is_bpf_text_address+0xd7/0x170 [ 434.959238] ? find_held_lock+0x36/0x1c0 [ 434.963376] ? check_same_owner+0x340/0x340 [ 434.967701] ? kasan_slab_free+0xe/0x10 [ 434.971704] ? kmem_cache_free+0x86/0x2d0 [ 434.975869] ? putname+0xf2/0x130 [ 434.979338] ? rcu_note_context_switch+0x730/0x730 [ 434.984274] ? ksys_mount+0x12d/0x140 [ 434.988082] ? __x64_sys_mount+0xbe/0x150 [ 434.992244] __should_failslab+0x124/0x180 [ 434.996492] should_failslab+0x9/0x14 [ 435.000305] kmem_cache_alloc+0x2af/0x760 [ 435.004494] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 435.009347] ? do_raw_spin_lock+0xc1/0x200 [ 435.013593] alloc_vfsmnt+0xe8/0x9f0 [ 435.017317] ? mnt_free_id.isra.27+0x60/0x60 [ 435.021740] ? graph_lock+0x170/0x170 [ 435.025573] ? rcu_pm_notify+0xc0/0xc0 [ 435.029474] ? putname+0xf2/0x130 [ 435.032980] ? find_held_lock+0x36/0x1c0 [ 435.037066] ? lock_downgrade+0x8f0/0x8f0 [ 435.041222] ? lock_release+0xa30/0xa30 [ 435.045211] ? mpi_free.cold.1+0x19/0x19 [ 435.049289] vfs_kern_mount.part.34+0x90/0x4e0 [ 435.053881] ? may_umount+0xb0/0xb0 [ 435.057970] ? _raw_read_unlock+0x22/0x30 [ 435.062129] ? __get_fs_type+0x97/0xc0 [ 435.066048] do_mount+0x581/0x30e0 [ 435.069596] ? do_raw_spin_unlock+0xa7/0x2f0 [ 435.074018] ? copy_mount_string+0x40/0x40 [ 435.078272] ? copy_mount_options+0x5f/0x380 [ 435.082691] ? rcu_read_lock_sched_held+0x108/0x120 [ 435.087754] ? kmem_cache_alloc_trace+0x616/0x780 [ 435.092634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.098185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.103775] ? copy_mount_options+0x285/0x380 [ 435.108283] ksys_mount+0x12d/0x140 [ 435.111954] __x64_sys_mount+0xbe/0x150 [ 435.115963] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 435.120991] do_syscall_64+0x1b9/0x820 [ 435.124881] ? finish_task_switch+0x1d3/0x870 [ 435.129385] ? syscall_return_slowpath+0x5e0/0x5e0 [ 435.134321] ? syscall_return_slowpath+0x31d/0x5e0 [ 435.139285] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 435.144659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.149512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.154706] RIP: 0033:0x459aba [ 435.157903] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.177042] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 435.184756] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba 13:48:34 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat&', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:34 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000008c0)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d98c5b0cb8614fcff9bfb780b73f93a6000000000000000000000000", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f000000b0c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000001800)=[{&(0x7f00000004c0)=""/189, 0x30}], 0x1, &(0x7f0000001880)=""/83, 0x53}}], 0x4ef, 0x0, 0x0) [ 435.192028] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 435.199302] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 435.206572] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 435.213860] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000028 13:48:34 executing program 5 (fault-call:2 fault-nth:41): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:34 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x6f) 13:48:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1100}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 435.394315] FAULT_INJECTION: forcing a failure. [ 435.394315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.406173] CPU: 0 PID: 30459 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 435.413193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.422557] Call Trace: [ 435.425166] dump_stack+0x1c9/0x2b4 [ 435.428819] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.434042] should_fail.cold.4+0xa/0x11 [ 435.438153] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.443304] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 435.448348] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 435.454188] ? trace_hardirqs_on+0x10/0x10 [ 435.458476] ? wait_for_completion+0x8d0/0x8d0 [ 435.463088] ? lock_downgrade+0x8f0/0x8f0 [ 435.467262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.472841] ? find_next_zero_bit+0x111/0x140 [ 435.477387] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 435.482252] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 435.487115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.492667] ? should_fail+0x246/0xd86 [ 435.496590] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.501711] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.506849] __alloc_pages_nodemask+0x36e/0xdb0 [ 435.511566] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 435.516622] ? find_held_lock+0x36/0x1c0 [ 435.520730] ? check_same_owner+0x340/0x340 [ 435.525077] cache_grow_begin+0x91/0x710 [ 435.529176] kmem_cache_alloc+0x689/0x760 [ 435.533347] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 435.538399] getname_kernel+0x54/0x370 [ 435.542364] kern_path+0x1e/0x40 [ 435.545766] lookup_bdev+0x10c/0x250 [ 435.549502] ? blkdev_open+0x280/0x280 [ 435.553424] ? find_held_lock+0x36/0x1c0 [ 435.557508] blkdev_get_by_path+0x1f/0xe0 [ 435.561682] mount_bdev+0x5d/0x3e0 [ 435.565244] ? vfat_mount+0x40/0x40 [ 435.568899] vfat_mount+0x34/0x40 [ 435.572390] mount_fs+0xae/0x328 [ 435.575792] vfs_kern_mount.part.34+0xdc/0x4e0 [ 435.580390] ? may_umount+0xb0/0xb0 [ 435.584056] ? _raw_read_unlock+0x22/0x30 [ 435.588221] ? __get_fs_type+0x97/0xc0 [ 435.592147] do_mount+0x581/0x30e0 [ 435.595702] ? interrupt_entry+0xb1/0xf0 [ 435.599782] ? copy_mount_string+0x40/0x40 [ 435.604042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 435.608823] ? retint_kernel+0x10/0x10 [ 435.612778] ? copy_mount_options+0x1f0/0x380 [ 435.617291] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 435.622150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.627705] ? copy_mount_options+0x285/0x380 [ 435.632225] ksys_mount+0x12d/0x140 [ 435.635886] __x64_sys_mount+0xbe/0x150 [ 435.639912] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 435.644968] do_syscall_64+0x1b9/0x820 [ 435.648874] ? finish_task_switch+0x1d3/0x870 [ 435.653393] ? syscall_return_slowpath+0x5e0/0x5e0 [ 435.658339] ? syscall_return_slowpath+0x31d/0x5e0 [ 435.663288] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 435.668679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.673548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.678746] RIP: 0033:0x459aba 13:48:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2100}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 435.681971] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.700898] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 435.708631] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 435.715961] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 435.723250] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 435.730539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 435.737813] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000029 13:48:34 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$VT_RELDISP(r3, 0x5605) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) r4 = dup(r2) write$P9_RSTAT(r4, &(0x7f0000000180)=ANY=[], 0x0) 13:48:34 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfatH', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:35 executing program 5 (fault-call:2 fault-nth:42): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:35 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat&', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:35 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x200000000000000) 13:48:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7c}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:35 executing program 7: [ 436.235401] FAULT_INJECTION: forcing a failure. [ 436.235401] name failslab, interval 1, probability 0, space 0, times 0 [ 436.246800] CPU: 0 PID: 30523 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 436.253825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.263196] Call Trace: [ 436.265805] dump_stack+0x1c9/0x2b4 [ 436.269476] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.274702] should_fail.cold.4+0xa/0x11 [ 436.278791] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.283958] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 436.288856] ? graph_lock+0x170/0x170 [ 436.292727] ? find_held_lock+0x36/0x1c0 [ 436.296814] ? __lock_is_held+0xb5/0x140 [ 436.300926] ? check_same_owner+0x340/0x340 [ 436.305296] ? rcu_note_context_switch+0x730/0x730 [ 436.310253] __should_failslab+0x124/0x180 [ 436.314518] should_failslab+0x9/0x14 [ 436.318344] kmem_cache_alloc_trace+0x2cb/0x780 [ 436.323035] ? kasan_check_write+0x14/0x20 [ 436.327309] ? do_raw_spin_lock+0xc1/0x200 [ 436.331568] sget_userns+0x1cf/0xf20 [ 436.335307] ? kill_litter_super+0x90/0x90 [ 436.339567] ? ns_test_super+0x50/0x50 [ 436.343527] ? destroy_unused_super.part.11+0x110/0x110 [ 436.348959] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 436.353566] ? kasan_check_write+0x14/0x20 [ 436.357823] ? do_raw_spin_lock+0xc1/0x200 [ 436.362083] ? blkdev_get+0xc8/0xb50 [ 436.365826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.371473] ? cap_capable+0x1f9/0x260 [ 436.375488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.381056] ? security_capable+0x99/0xc0 [ 436.385224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.390781] ? ns_capable_common+0x13f/0x170 [ 436.395212] ? kill_litter_super+0x90/0x90 [ 436.399471] sget+0x10b/0x150 [ 436.402600] ? ns_test_super+0x50/0x50 [ 436.406514] mount_bdev+0x111/0x3e0 [ 436.410171] ? vfat_mount+0x40/0x40 [ 436.413826] vfat_mount+0x34/0x40 [ 436.417298] mount_fs+0xae/0x328 [ 436.420695] vfs_kern_mount.part.34+0xdc/0x4e0 [ 436.425329] ? may_umount+0xb0/0xb0 [ 436.428993] ? _raw_read_unlock+0x22/0x30 [ 436.433159] ? __get_fs_type+0x97/0xc0 [ 436.437071] do_mount+0x581/0x30e0 [ 436.440634] ? copy_mount_string+0x40/0x40 [ 436.444890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 436.449678] ? retint_kernel+0x10/0x10 [ 436.453588] ? copy_mount_options+0x1f0/0x380 [ 436.458100] ? copy_mount_options+0x1fa/0x380 [ 436.462608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.468170] ? copy_mount_options+0x285/0x380 [ 436.472694] ksys_mount+0x12d/0x140 [ 436.476348] __x64_sys_mount+0xbe/0x150 [ 436.480354] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 436.485400] do_syscall_64+0x1b9/0x820 [ 436.489306] ? syscall_slow_exit_work+0x500/0x500 [ 436.494164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.499109] ? syscall_return_slowpath+0x31d/0x5e0 [ 436.504060] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 436.509446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.514310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.519509] RIP: 0033:0x459aba 13:48:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:35 executing program 7: [ 436.522725] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 436.541635] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.549361] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 436.556643] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 436.563942] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 436.571231] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 436.578518] R13: 0000000000000000 R14: 00000000004c9d2d R15: 000000000000002a 13:48:35 executing program 5 (fault-call:2 fault-nth:43): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:35 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:35 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x26e9) [ 436.710355] FAULT_INJECTION: forcing a failure. [ 436.710355] name failslab, interval 1, probability 0, space 0, times 0 [ 436.722257] CPU: 1 PID: 30545 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 436.729284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.738665] Call Trace: [ 436.741291] dump_stack+0x1c9/0x2b4 [ 436.744941] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.750150] ? __kernel_text_address+0xd/0x40 [ 436.754667] ? unwind_get_return_address+0x61/0xa0 13:48:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:35 executing program 7: [ 436.759621] should_fail.cold.4+0xa/0x11 [ 436.763712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.768841] ? save_stack+0x43/0xd0 [ 436.772529] ? kasan_kmalloc+0xc4/0xe0 [ 436.776437] ? kmem_cache_alloc_trace+0x152/0x780 [ 436.781307] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 436.786517] ? __list_lru_init+0x46a/0x7c0 [ 436.790777] ? sget_userns+0x755/0xf20 [ 436.794687] ? graph_lock+0x170/0x170 [ 436.798518] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 436.803309] ? do_mount+0x581/0x30e0 [ 436.807042] ? ksys_mount+0x12d/0x140 [ 436.810857] ? __x64_sys_mount+0xbe/0x150 [ 436.815025] ? do_syscall_64+0x1b9/0x820 [ 436.819111] ? find_held_lock+0x36/0x1c0 [ 436.823198] ? __lock_is_held+0xb5/0x140 [ 436.827292] ? check_same_owner+0x340/0x340 [ 436.831634] ? rcu_note_context_switch+0x730/0x730 [ 436.836588] __should_failslab+0x124/0x180 [ 436.840872] should_failslab+0x9/0x14 [ 436.844696] kmem_cache_alloc_trace+0x2cb/0x780 [ 436.849401] ? __kmalloc_node+0x33/0x70 [ 436.853397] ? __kmalloc_node+0x33/0x70 [ 436.857396] ? rcu_read_lock_sched_held+0x108/0x120 [ 436.862438] __memcg_init_list_lru_node+0x185/0x2d0 [ 436.867492] ? kvfree_rcu+0x20/0x20 [ 436.871144] ? __kmalloc_node+0x47/0x70 [ 436.875141] __list_lru_init+0x46a/0x7c0 [ 436.879229] ? list_lru_destroy+0x4d0/0x4d0 [ 436.883572] ? __lockdep_init_map+0x105/0x590 [ 436.888094] ? __init_waitqueue_head+0x9e/0x150 [ 436.892778] ? init_wait_entry+0x1c0/0x1c0 [ 436.897039] ? __lockdep_init_map+0x105/0x590 [ 436.901566] sget_userns+0x755/0xf20 [ 436.905298] ? kill_litter_super+0x90/0x90 [ 436.909568] ? ns_test_super+0x50/0x50 [ 436.913911] ? destroy_unused_super.part.11+0x110/0x110 [ 436.919291] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 436.923877] ? kasan_check_write+0x14/0x20 [ 436.928114] ? do_raw_spin_lock+0xc1/0x200 [ 436.932355] ? blkdev_get+0xc8/0xb50 [ 436.936078] ? cap_capable+0x1f9/0x260 [ 436.939989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.945640] ? security_capable+0x99/0xc0 [ 436.949796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.955338] ? ns_capable_common+0x13f/0x170 [ 436.959758] ? kill_litter_super+0x90/0x90 [ 436.963998] sget+0x10b/0x150 [ 436.967135] ? ns_test_super+0x50/0x50 [ 436.971032] mount_bdev+0x111/0x3e0 [ 436.974702] ? vfat_mount+0x40/0x40 [ 436.978345] vfat_mount+0x34/0x40 [ 436.981838] mount_fs+0xae/0x328 [ 436.985241] vfs_kern_mount.part.34+0xdc/0x4e0 [ 436.989862] ? may_umount+0xb0/0xb0 [ 436.993498] ? _raw_read_unlock+0x22/0x30 [ 436.997651] ? __get_fs_type+0x97/0xc0 [ 437.001576] do_mount+0x581/0x30e0 [ 437.005145] ? copy_mount_string+0x40/0x40 [ 437.009404] ? copy_mount_options+0x5f/0x380 [ 437.013845] ? rcu_read_lock_sched_held+0x108/0x120 [ 437.018866] ? kmem_cache_alloc_trace+0x616/0x780 [ 437.023719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.029345] ? _copy_from_user+0xdf/0x150 [ 437.033505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.039055] ? copy_mount_options+0x285/0x380 [ 437.043561] ksys_mount+0x12d/0x140 [ 437.047195] __x64_sys_mount+0xbe/0x150 [ 437.051175] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 437.056201] do_syscall_64+0x1b9/0x820 [ 437.060092] ? finish_task_switch+0x1d3/0x870 [ 437.064589] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.069522] ? syscall_return_slowpath+0x31d/0x5e0 [ 437.074466] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 437.079848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.084700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.089888] RIP: 0033:0x459aba [ 437.093089] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 13:48:36 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000040), 0x8) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x20}, 0x7fff}}, 0x3, 0x7, 0x6, 0x8001, 0x99}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r3, 0x2b}, &(0x7f0000000200)=0x8) r4 = dup(r2) write$P9_RSTAT(r4, &(0x7f0000000180)=ANY=[], 0x0) 13:48:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x22}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 437.111999] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 437.119760] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 437.127046] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 437.134314] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 437.141586] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 437.148856] R13: 0000000000000000 R14: 00000000004c9d2d R15: 000000000000002b 13:48:36 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661740f", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:36 executing program 7: 13:48:36 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:36 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffffffffff0) 13:48:36 executing program 5 (fault-call:2 fault-nth:44): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 437.433784] FAULT_INJECTION: forcing a failure. [ 437.433784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.445639] CPU: 0 PID: 30593 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 437.452664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.462029] Call Trace: [ 437.464644] dump_stack+0x1c9/0x2b4 [ 437.468299] ? dump_stack_print_info.cold.2+0x52/0x52 [ 437.473520] should_fail.cold.4+0xa/0x11 [ 437.477611] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.482753] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 437.487794] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 437.493623] ? trace_hardirqs_on+0x10/0x10 [ 437.497903] ? wait_for_completion+0x8d0/0x8d0 [ 437.502509] ? lock_downgrade+0x8f0/0x8f0 [ 437.506681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.512237] ? find_next_zero_bit+0x111/0x140 [ 437.516765] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 437.521634] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 437.526538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.532103] ? should_fail+0x246/0xd86 [ 437.536012] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.541129] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.546260] __alloc_pages_nodemask+0x36e/0xdb0 [ 437.550969] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 437.556040] ? find_held_lock+0x36/0x1c0 [ 437.560146] ? check_same_owner+0x340/0x340 [ 437.564510] cache_grow_begin+0x91/0x710 [ 437.568607] kmem_cache_alloc+0x689/0x760 [ 437.572791] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 437.577867] getname_kernel+0x54/0x370 [ 437.581781] kern_path+0x1e/0x40 [ 437.585173] lookup_bdev+0x10c/0x250 [ 437.588904] ? blkdev_open+0x280/0x280 [ 437.592814] ? find_held_lock+0x36/0x1c0 [ 437.596900] blkdev_get_by_path+0x1f/0xe0 [ 437.601069] mount_bdev+0x5d/0x3e0 [ 437.604633] ? vfat_mount+0x40/0x40 [ 437.608292] vfat_mount+0x34/0x40 [ 437.611768] mount_fs+0xae/0x328 [ 437.615164] vfs_kern_mount.part.34+0xdc/0x4e0 [ 437.619784] ? may_umount+0xb0/0xb0 [ 437.623454] ? _raw_read_unlock+0x22/0x30 [ 437.627617] ? __get_fs_type+0x97/0xc0 [ 437.631532] do_mount+0x581/0x30e0 [ 437.635096] ? do_raw_spin_unlock+0xa7/0x2f0 [ 437.639526] ? copy_mount_string+0x40/0x40 [ 437.643800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 437.648580] ? retint_kernel+0x10/0x10 [ 437.652510] ? copy_mount_options+0x1f0/0x380 [ 437.657031] ? copy_mount_options+0x1fa/0x380 [ 437.661543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.667103] ? copy_mount_options+0x285/0x380 [ 437.671620] ksys_mount+0x12d/0x140 [ 437.675269] __x64_sys_mount+0xbe/0x150 [ 437.679265] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 437.684299] do_syscall_64+0x1b9/0x820 [ 437.688206] ? finish_task_switch+0x1d3/0x870 [ 437.692736] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.697700] ? syscall_return_slowpath+0x31d/0x5e0 [ 437.702648] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 437.708030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.712900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.718111] RIP: 0033:0x459aba 13:48:36 executing program 7: 13:48:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x75}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:36 executing program 7: 13:48:36 executing program 7: socket$kcm(0xa, 0x6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x100000000145002, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)=0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x101000, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x2, 0x5, 0x1, 0x94ee, 0x0, 0x9, 0x0, 0xc, 0x4, 0x0, 0x80000000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000001400)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'eql\x00', 0x800}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) gettid() ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'irlan0\x00', 0x8802}) close(r4) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000400)=ANY=[@ANYBLOB="01000400aaaaaaaaaa98aa0000db1c245267f8b9fc000100000000000000"]) socketpair(0x1, 0x5, 0x4, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000001480)={0x3, &(0x7f0000001440)=[{0x200000000000000, 0x2, 0x80, 0xbda3}, {0xa0, 0x7, 0x4, 0x80000000}, {0xf27, 0xa8b, 0x8, 0x9}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000003c0)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0xa) 13:48:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1f000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 437.721316] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 437.740237] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 437.747977] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 437.755252] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 437.762556] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 437.769830] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 437.777132] R13: 0000000000000000 R14: 00000000004c9d2d R15: 000000000000002c 13:48:36 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:36 executing program 2: socket$inet6(0xa, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:37 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x300000000000000) 13:48:37 executing program 6: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @local, 0x0, 0x2, [@remote, @multicast2]}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) 13:48:37 executing program 5 (fault-call:2 fault-nth:45): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:37 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat&', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:37 executing program 2: socket$inet6(0xa, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 438.278722] FAULT_INJECTION: forcing a failure. [ 438.278722] name failslab, interval 1, probability 0, space 0, times 0 [ 438.290050] CPU: 1 PID: 30652 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 438.297071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.306430] Call Trace: [ 438.309043] dump_stack+0x1c9/0x2b4 [ 438.312692] ? dump_stack_print_info.cold.2+0x52/0x52 [ 438.317897] ? __kernel_text_address+0xd/0x40 [ 438.322420] ? unwind_get_return_address+0x61/0xa0 [ 438.327379] should_fail.cold.4+0xa/0x11 [ 438.331474] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.336620] ? save_stack+0x43/0xd0 [ 438.340256] ? kasan_kmalloc+0xc4/0xe0 [ 438.344158] ? kmem_cache_alloc_trace+0x152/0x780 [ 438.349038] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 438.354239] ? __list_lru_init+0x46a/0x7c0 [ 438.358490] ? sget_userns+0x755/0xf20 [ 438.362402] ? graph_lock+0x170/0x170 [ 438.366254] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 438.371025] ? do_mount+0x581/0x30e0 [ 438.374752] ? ksys_mount+0x12d/0x140 [ 438.378574] ? __x64_sys_mount+0xbe/0x150 [ 438.382736] ? do_syscall_64+0x1b9/0x820 [ 438.386819] ? find_held_lock+0x36/0x1c0 [ 438.390906] ? __lock_is_held+0xb5/0x140 [ 438.395010] ? check_same_owner+0x340/0x340 [ 438.399351] ? rcu_note_context_switch+0x730/0x730 [ 438.404302] __should_failslab+0x124/0x180 [ 438.408579] should_failslab+0x9/0x14 [ 438.412423] kmem_cache_alloc_trace+0x2cb/0x780 [ 438.417110] ? __kmalloc_node+0x33/0x70 [ 438.421099] ? __kmalloc_node+0x33/0x70 [ 438.425091] ? rcu_read_lock_sched_held+0x108/0x120 [ 438.430134] __memcg_init_list_lru_node+0x185/0x2d0 [ 438.435170] ? kvfree_rcu+0x20/0x20 [ 438.438815] ? __kmalloc_node+0x47/0x70 [ 438.442811] __list_lru_init+0x46a/0x7c0 [ 438.446895] ? list_lru_destroy+0x4d0/0x4d0 [ 438.451240] ? __lockdep_init_map+0x105/0x590 [ 438.455757] ? __init_waitqueue_head+0x9e/0x150 [ 438.460438] ? init_wait_entry+0x1c0/0x1c0 [ 438.464700] ? __lockdep_init_map+0x105/0x590 [ 438.469221] sget_userns+0x755/0xf20 [ 438.472962] ? kill_litter_super+0x90/0x90 [ 438.477219] ? ns_test_super+0x50/0x50 [ 438.481125] ? destroy_unused_super.part.11+0x110/0x110 [ 438.486514] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 438.491114] ? kasan_check_write+0x14/0x20 [ 438.495385] ? do_raw_spin_lock+0xc1/0x200 [ 438.499633] ? blkdev_get+0xc8/0xb50 [ 438.503369] ? cap_capable+0x1f9/0x260 [ 438.507278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.512828] ? security_capable+0x99/0xc0 [ 438.516996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.522548] ? ns_capable_common+0x13f/0x170 [ 438.526986] ? kill_litter_super+0x90/0x90 [ 438.531236] sget+0x10b/0x150 [ 438.534355] ? ns_test_super+0x50/0x50 [ 438.538260] mount_bdev+0x111/0x3e0 [ 438.541898] ? vfat_mount+0x40/0x40 [ 438.545544] vfat_mount+0x34/0x40 [ 438.549014] mount_fs+0xae/0x328 [ 438.552426] vfs_kern_mount.part.34+0xdc/0x4e0 [ 438.557040] ? may_umount+0xb0/0xb0 [ 438.560708] ? _raw_read_unlock+0x22/0x30 [ 438.564865] ? __get_fs_type+0x97/0xc0 [ 438.568768] do_mount+0x581/0x30e0 [ 438.572329] ? copy_mount_string+0x40/0x40 [ 438.576584] ? copy_mount_options+0x5f/0x380 [ 438.581010] ? rcu_read_lock_sched_held+0x108/0x120 [ 438.586041] ? kmem_cache_alloc_trace+0x616/0x780 [ 438.590901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.596469] ? _copy_from_user+0xdf/0x150 [ 438.600637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.606192] ? copy_mount_options+0x285/0x380 [ 438.610728] ksys_mount+0x12d/0x140 [ 438.614369] __x64_sys_mount+0xbe/0x150 [ 438.618356] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 438.623418] do_syscall_64+0x1b9/0x820 [ 438.627321] ? finish_task_switch+0x1d3/0x870 [ 438.631832] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.636773] ? syscall_return_slowpath+0x31d/0x5e0 [ 438.641725] ? __switch_to_asm+0x34/0x70 [ 438.645794] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 438.651175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.656035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.661231] RIP: 0033:0x459aba [ 438.664435] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 438.683353] RSP: 002b:00007f4fa7b18a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.691096] RAX: ffffffffffffffda RBX: 00007f4fa7b18b30 RCX: 0000000000459aba [ 438.698369] RDX: 00007f4fa7b18ad0 RSI: 0000000020000200 RDI: 00007f4fa7b18af0 [ 438.705669] RBP: 0000000020000200 R08: 00007f4fa7b18b30 R09: 00007f4fa7b18ad0 [ 438.712948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 438.720223] R13: 0000000000000000 R14: 00000000004c9d2d R15: 000000000000002d 13:48:37 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:37 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd401000100ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000780)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000080)={0x0, 0x80, 0x0, 'queue0\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) 13:48:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:37 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000000000000) 13:48:37 executing program 2: socket$inet6(0xa, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:37 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000090000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f000016c000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 13:48:37 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfath', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:37 executing program 5 (fault-call:2 fault-nth:46): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 438.855731] FAULT_INJECTION: forcing a failure. [ 438.855731] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 438.867597] CPU: 0 PID: 30674 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 438.874616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.883984] Call Trace: [ 438.886594] dump_stack+0x1c9/0x2b4 [ 438.890249] ? dump_stack_print_info.cold.2+0x52/0x52 [ 438.895479] should_fail.cold.4+0xa/0x11 [ 438.899586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.904714] ? lock_acquire+0x1e4/0x540 [ 438.908711] ? lo_open+0x1b/0xb0 [ 438.912098] ? trace_hardirqs_on+0x10/0x10 [ 438.916347] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 438.921207] ? trace_hardirqs_on+0x10/0x10 [ 438.925454] ? __lock_acquire+0x7fc/0x5020 [ 438.929705] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 438.934570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.940113] ? should_fail+0x246/0xd86 [ 438.944013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.949133] __alloc_pages_nodemask+0x36e/0xdb0 [ 438.953844] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 438.958871] ? find_held_lock+0x36/0x1c0 [ 438.962964] ? __lock_is_held+0xb5/0x140 [ 438.967051] ? check_same_owner+0x340/0x340 [ 438.971411] cache_grow_begin+0x91/0x710 [ 438.975503] kmem_cache_alloc_trace+0x6a5/0x780 [ 438.980187] ? kasan_check_write+0x14/0x20 [ 438.984444] ? do_raw_spin_lock+0xc1/0x200 [ 438.988698] sget_userns+0x1cf/0xf20 [ 438.992420] ? kill_litter_super+0x90/0x90 [ 438.996687] ? ns_test_super+0x50/0x50 [ 439.000596] ? destroy_unused_super.part.11+0x110/0x110 [ 439.005976] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 439.010572] ? kasan_check_write+0x14/0x20 [ 439.014831] ? do_raw_spin_lock+0xc1/0x200 [ 439.019078] ? blkdev_get+0xc8/0xb50 [ 439.022806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.028351] ? cap_capable+0x1f9/0x260 [ 439.032277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.037822] ? security_capable+0x99/0xc0 [ 439.042001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.047548] ? ns_capable_common+0x13f/0x170 [ 439.051973] ? kill_litter_super+0x90/0x90 [ 439.056217] sget+0x10b/0x150 [ 439.059327] ? ns_test_super+0x50/0x50 [ 439.063228] mount_bdev+0x111/0x3e0 [ 439.066861] ? vfat_mount+0x40/0x40 [ 439.070521] vfat_mount+0x34/0x40 [ 439.073985] mount_fs+0xae/0x328 [ 439.077366] vfs_kern_mount.part.34+0xdc/0x4e0 [ 439.081962] ? may_umount+0xb0/0xb0 [ 439.085596] ? _raw_read_unlock+0x22/0x30 [ 439.089758] ? __get_fs_type+0x97/0xc0 [ 439.093682] do_mount+0x581/0x30e0 [ 439.097227] ? do_raw_spin_unlock+0xa7/0x2f0 [ 439.101658] ? interrupt_entry+0xb1/0xf0 [ 439.105724] ? copy_mount_string+0x40/0x40 [ 439.109975] ? retint_kernel+0x10/0x10 [ 439.113874] ? copy_mount_options+0x213/0x380 [ 439.118376] ? write_comp_data+0x1b/0x70 [ 439.122493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.128040] ? copy_mount_options+0x285/0x380 [ 439.132546] ksys_mount+0x12d/0x140 [ 439.136201] __x64_sys_mount+0xbe/0x150 [ 439.140182] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 439.145210] do_syscall_64+0x1b9/0x820 [ 439.149101] ? finish_task_switch+0x1d3/0x870 [ 439.153605] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.158540] ? syscall_return_slowpath+0x31d/0x5e0 [ 439.163766] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 439.169156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.174013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.179204] RIP: 0033:0x459aba [ 439.182404] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 13:48:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:37 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x1) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) [ 439.201309] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.209023] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 439.216292] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 439.223578] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 439.230845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 439.238115] R13: 0000000000000000 R14: 00000000004c9d2d R15: 000000000000002e 13:48:38 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:38 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x200000) 13:48:38 executing program 5 (fault-call:2 fault-nth:47): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 439.305265] input: syz0 as /devices/virtual/input/input13 [ 439.350894] input: syz0 as /devices/virtual/input/input14 13:48:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x19}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:38 executing program 7: [ 439.422321] FAULT_INJECTION: forcing a failure. [ 439.422321] name failslab, interval 1, probability 0, space 0, times 0 [ 439.433708] CPU: 0 PID: 30701 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 439.440784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.450148] Call Trace: [ 439.452755] dump_stack+0x1c9/0x2b4 [ 439.456407] ? dump_stack_print_info.cold.2+0x52/0x52 [ 439.461618] ? __kernel_text_address+0xd/0x40 [ 439.466153] should_fail.cold.4+0xa/0x11 [ 439.470245] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.475391] ? save_stack+0x43/0xd0 [ 439.479034] ? kasan_kmalloc+0xc4/0xe0 [ 439.482967] ? kmem_cache_alloc_trace+0x152/0x780 [ 439.487830] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 439.493042] ? __list_lru_init+0x46a/0x7c0 [ 439.497303] ? sget_userns+0x755/0xf20 [ 439.501221] ? graph_lock+0x170/0x170 [ 439.505055] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 439.509842] ? do_mount+0x581/0x30e0 [ 439.513572] ? ksys_mount+0x12d/0x140 [ 439.517393] ? __x64_sys_mount+0xbe/0x150 [ 439.521583] ? find_held_lock+0x36/0x1c0 [ 439.525666] ? __lock_is_held+0xb5/0x140 [ 439.529786] ? check_same_owner+0x340/0x340 [ 439.534139] ? rcu_note_context_switch+0x730/0x730 [ 439.539096] __should_failslab+0x124/0x180 [ 439.543353] should_failslab+0x9/0x14 [ 439.547215] kmem_cache_alloc_trace+0x2cb/0x780 [ 439.551902] ? __kmalloc_node+0x33/0x70 [ 439.555907] ? __kmalloc_node+0x33/0x70 [ 439.559942] ? rcu_read_lock_sched_held+0x108/0x120 [ 439.565008] __memcg_init_list_lru_node+0x185/0x2d0 [ 439.570051] ? kvfree_rcu+0x20/0x20 [ 439.573700] ? __kmalloc_node+0x47/0x70 [ 439.577699] __list_lru_init+0x46a/0x7c0 [ 439.581787] ? list_lru_destroy+0x4d0/0x4d0 [ 439.586130] ? __lockdep_init_map+0x105/0x590 [ 439.590649] ? __init_waitqueue_head+0x9e/0x150 [ 439.595333] ? init_wait_entry+0x1c0/0x1c0 [ 439.599591] ? __lockdep_init_map+0x105/0x590 [ 439.604142] sget_userns+0x755/0xf20 [ 439.607875] ? kill_litter_super+0x90/0x90 [ 439.612134] ? ns_test_super+0x50/0x50 [ 439.616046] ? destroy_unused_super.part.11+0x110/0x110 [ 439.621425] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 439.626024] ? kasan_check_write+0x14/0x20 [ 439.630275] ? do_raw_spin_lock+0xc1/0x200 [ 439.634554] ? blkdev_get+0xc8/0xb50 [ 439.638290] ? cap_capable+0x1f9/0x260 [ 439.642199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.647750] ? security_capable+0x99/0xc0 [ 439.651917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.657478] ? ns_capable_common+0x13f/0x170 [ 439.661906] ? kill_litter_super+0x90/0x90 [ 439.666154] sget+0x10b/0x150 [ 439.669279] ? ns_test_super+0x50/0x50 [ 439.673184] mount_bdev+0x111/0x3e0 [ 439.676829] ? vfat_mount+0x40/0x40 [ 439.680491] vfat_mount+0x34/0x40 [ 439.683991] mount_fs+0xae/0x328 [ 439.687383] vfs_kern_mount.part.34+0xdc/0x4e0 [ 439.692002] ? may_umount+0xb0/0xb0 [ 439.695645] ? _raw_read_unlock+0x22/0x30 [ 439.699823] ? __get_fs_type+0x97/0xc0 [ 439.703745] do_mount+0x581/0x30e0 [ 439.707302] ? interrupt_entry+0xb1/0xf0 [ 439.711381] ? copy_mount_string+0x40/0x40 [ 439.715637] ? retint_kernel+0x10/0x10 [ 439.719548] ? copy_mount_options+0x1e3/0x380 [ 439.724066] ? write_comp_data+0xa/0x70 [ 439.728065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.733616] ? copy_mount_options+0x285/0x380 [ 439.738132] ksys_mount+0x12d/0x140 [ 439.741781] __x64_sys_mount+0xbe/0x150 [ 439.745767] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 439.750833] do_syscall_64+0x1b9/0x820 [ 439.754744] ? finish_task_switch+0x1d3/0x870 [ 439.759255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.764214] ? syscall_return_slowpath+0x31d/0x5e0 [ 439.769166] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 439.774594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.779514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.784766] RIP: 0033:0x459aba [ 439.787979] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 439.806890] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.814613] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 439.821891] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 439.829167] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 439.836464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 439.843785] R13: 0000000000000000 R14: 00000000004c9d2d R15: 000000000000002f 13:48:39 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:39 executing program 7: 13:48:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1300000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:39 executing program 6: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfath', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:39 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfatL', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:39 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf0) 13:48:39 executing program 5 (fault-call:2 fault-nth:48): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 440.221346] FAULT_INJECTION: forcing a failure. [ 440.221346] name failslab, interval 1, probability 0, space 0, times 0 [ 440.232802] CPU: 1 PID: 30732 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 440.239860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.249218] Call Trace: [ 440.251855] dump_stack+0x1c9/0x2b4 [ 440.255508] ? dump_stack_print_info.cold.2+0x52/0x52 [ 440.260720] ? __kernel_text_address+0xd/0x40 [ 440.265245] should_fail.cold.4+0xa/0x11 [ 440.269330] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.274485] ? save_stack+0x43/0xd0 [ 440.278147] ? kasan_kmalloc+0xc4/0xe0 [ 440.282057] ? kmem_cache_alloc_trace+0x152/0x780 [ 440.286929] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 440.292143] ? __list_lru_init+0x46a/0x7c0 [ 440.296437] ? sget_userns+0x755/0xf20 [ 440.300366] ? graph_lock+0x170/0x170 [ 440.304201] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 440.309004] ? do_mount+0x581/0x30e0 [ 440.312740] ? ksys_mount+0x12d/0x140 [ 440.316585] ? __x64_sys_mount+0xbe/0x150 [ 440.320764] ? find_held_lock+0x36/0x1c0 [ 440.324854] ? __lock_is_held+0xb5/0x140 [ 440.328971] ? check_same_owner+0x340/0x340 [ 440.333317] ? rcu_note_context_switch+0x730/0x730 [ 440.338273] __should_failslab+0x124/0x180 [ 440.342530] should_failslab+0x9/0x14 [ 440.346354] kmem_cache_alloc_trace+0x2cb/0x780 [ 440.351041] ? __kmalloc_node+0x33/0x70 [ 440.355034] ? __kmalloc_node+0x33/0x70 [ 440.359032] ? rcu_read_lock_sched_held+0x108/0x120 [ 440.364076] __memcg_init_list_lru_node+0x185/0x2d0 [ 440.369121] ? kvfree_rcu+0x20/0x20 [ 440.372786] ? __kmalloc_node+0x47/0x70 [ 440.376791] __list_lru_init+0x46a/0x7c0 [ 440.380877] ? list_lru_destroy+0x4d0/0x4d0 [ 440.385313] ? __lockdep_init_map+0x105/0x590 [ 440.389841] ? __init_waitqueue_head+0x9e/0x150 [ 440.394529] ? init_wait_entry+0x1c0/0x1c0 [ 440.398801] ? __lockdep_init_map+0x105/0x590 [ 440.403335] sget_userns+0x755/0xf20 [ 440.407069] ? kill_litter_super+0x90/0x90 [ 440.411353] ? ns_test_super+0x50/0x50 [ 440.415266] ? destroy_unused_super.part.11+0x110/0x110 [ 440.420647] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 440.425251] ? kasan_check_write+0x14/0x20 [ 440.429526] ? do_raw_spin_lock+0xc1/0x200 [ 440.433785] ? blkdev_get+0xc8/0xb50 [ 440.437531] ? cap_capable+0x1f9/0x260 [ 440.441456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.447012] ? security_capable+0x99/0xc0 [ 440.451186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.456748] ? ns_capable_common+0x13f/0x170 [ 440.461176] ? kill_litter_super+0x90/0x90 [ 440.465428] sget+0x10b/0x150 [ 440.468556] ? ns_test_super+0x50/0x50 13:48:39 executing program 7: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x300000000000000) 13:48:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 440.472476] mount_bdev+0x111/0x3e0 [ 440.476126] ? vfat_mount+0x40/0x40 [ 440.479774] vfat_mount+0x34/0x40 [ 440.483247] mount_fs+0xae/0x328 [ 440.486638] vfs_kern_mount.part.34+0xdc/0x4e0 [ 440.491243] ? may_umount+0xb0/0xb0 [ 440.494886] ? _raw_read_unlock+0x22/0x30 [ 440.499047] ? __get_fs_type+0x97/0xc0 [ 440.502971] do_mount+0x581/0x30e0 [ 440.506541] ? copy_mount_string+0x40/0x40 [ 440.510807] ? copy_mount_options+0x5f/0x380 [ 440.515237] ? rcu_read_lock_sched_held+0x108/0x120 13:48:39 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffff8c) [ 440.520274] ? kmem_cache_alloc_trace+0x616/0x780 [ 440.525140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 440.530693] ? _copy_from_user+0xdf/0x150 [ 440.534892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.540504] ? copy_mount_options+0x285/0x380 [ 440.545059] ksys_mount+0x12d/0x140 [ 440.548719] __x64_sys_mount+0xbe/0x150 [ 440.552731] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 440.557769] do_syscall_64+0x1b9/0x820 [ 440.561686] ? syscall_return_slowpath+0x5e0/0x5e0 [ 440.566887] ? syscall_return_slowpath+0x31d/0x5e0 [ 440.571843] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 440.577237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.582105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.587309] RIP: 0033:0x459aba [ 440.590521] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 440.609463] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:48:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) [ 440.617199] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 440.624492] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 440.631776] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 440.639058] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 440.646342] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000030 13:48:39 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:39 executing program 6: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:39 executing program 5 (fault-call:2 fault-nth:49): ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:39 executing program 7 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 440.852285] FAULT_INJECTION: forcing a failure. [ 440.852285] name failslab, interval 1, probability 0, space 0, times 0 [ 440.863624] CPU: 1 PID: 30774 Comm: syz-executor5 Not tainted 4.18.0+ #190 [ 440.870658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.880022] Call Trace: [ 440.882628] dump_stack+0x1c9/0x2b4 [ 440.886273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 440.891491] ? __kernel_text_address+0xd/0x40 [ 440.895998] ? unwind_get_return_address+0x61/0xa0 [ 440.900948] should_fail.cold.4+0xa/0x11 [ 440.905022] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.910137] ? save_stack+0x43/0xd0 [ 440.913772] ? kasan_kmalloc+0xc4/0xe0 [ 440.917667] ? kmem_cache_alloc_trace+0x152/0x780 [ 440.922520] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 440.927734] ? __list_lru_init+0x46a/0x7c0 [ 440.931978] ? sget_userns+0x755/0xf20 [ 440.935891] ? graph_lock+0x170/0x170 [ 440.939699] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 440.944467] ? do_mount+0x581/0x30e0 [ 440.948193] ? ksys_mount+0x12d/0x140 [ 440.952002] ? __x64_sys_mount+0xbe/0x150 [ 440.956172] ? do_syscall_64+0x1b9/0x820 [ 440.960244] ? find_held_lock+0x36/0x1c0 [ 440.964319] ? __lock_is_held+0xb5/0x140 [ 440.968399] ? check_same_owner+0x340/0x340 [ 440.972729] ? rcu_note_context_switch+0x730/0x730 [ 440.977668] __should_failslab+0x124/0x180 [ 440.981928] should_failslab+0x9/0x14 [ 440.985746] kmem_cache_alloc_trace+0x2cb/0x780 [ 440.990420] ? __kmalloc_node+0x33/0x70 [ 440.994407] ? __kmalloc_node+0x33/0x70 [ 440.998391] ? rcu_read_lock_sched_held+0x108/0x120 [ 441.003423] __memcg_init_list_lru_node+0x185/0x2d0 [ 441.008464] ? kvfree_rcu+0x20/0x20 [ 441.012106] ? __kmalloc_node+0x47/0x70 [ 441.016098] __list_lru_init+0x46a/0x7c0 [ 441.020175] ? list_lru_destroy+0x4d0/0x4d0 [ 441.024511] ? __lockdep_init_map+0x105/0x590 [ 441.029022] ? __init_waitqueue_head+0x9e/0x150 [ 441.033698] ? init_wait_entry+0x1c0/0x1c0 [ 441.037950] ? __lockdep_init_map+0x105/0x590 [ 441.042504] sget_userns+0x755/0xf20 [ 441.046226] ? kill_litter_super+0x90/0x90 [ 441.050498] ? ns_test_super+0x50/0x50 [ 441.054420] ? destroy_unused_super.part.11+0x110/0x110 [ 441.059822] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 441.064411] ? kasan_check_write+0x14/0x20 [ 441.068671] ? do_raw_spin_lock+0xc1/0x200 [ 441.072912] ? blkdev_get+0xc8/0xb50 [ 441.076638] ? cap_capable+0x1f9/0x260 [ 441.080539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.086079] ? security_capable+0x99/0xc0 [ 441.090236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.095781] ? ns_capable_common+0x13f/0x170 [ 441.100200] ? kill_litter_super+0x90/0x90 [ 441.104440] sget+0x10b/0x150 [ 441.107558] ? ns_test_super+0x50/0x50 [ 441.111458] mount_bdev+0x111/0x3e0 [ 441.115129] ? vfat_mount+0x40/0x40 [ 441.118766] vfat_mount+0x34/0x40 [ 441.122222] mount_fs+0xae/0x328 [ 441.125605] vfs_kern_mount.part.34+0xdc/0x4e0 [ 441.130195] ? may_umount+0xb0/0xb0 [ 441.133838] ? _raw_read_unlock+0x22/0x30 [ 441.137989] ? __get_fs_type+0x97/0xc0 [ 441.141885] do_mount+0x581/0x30e0 [ 441.145435] ? copy_mount_string+0x40/0x40 [ 441.149681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 441.154446] ? retint_kernel+0x10/0x10 [ 441.158353] ? copy_mount_options+0x1e3/0x380 [ 441.163314] ? copy_mount_options+0x1e3/0x380 [ 441.167817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.173356] ? copy_mount_options+0x285/0x380 [ 441.177858] ksys_mount+0x12d/0x140 [ 441.181497] __x64_sys_mount+0xbe/0x150 [ 441.185482] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 441.190508] do_syscall_64+0x1b9/0x820 [ 441.194412] ? finish_task_switch+0x1d3/0x870 [ 441.198951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.203889] ? syscall_return_slowpath+0x31d/0x5e0 [ 441.208826] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 441.214196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.219050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.224240] RIP: 0033:0x459aba [ 441.227437] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 441.246342] RSP: 002b:00007f4fa7b5aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.254067] RAX: ffffffffffffffda RBX: 00007f4fa7b5ab30 RCX: 0000000000459aba [ 441.261338] RDX: 00007f4fa7b5aad0 RSI: 0000000020000200 RDI: 00007f4fa7b5aaf0 [ 441.268611] RBP: 0000000020000200 R08: 00007f4fa7b5ab30 R09: 00007f4fa7b5aad0 [ 441.275914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 441.283187] R13: 0000000000000000 R14: 00000000004c9d2d R15: 0000000000000031 [ 441.296813] FAULT_INJECTION: forcing a failure. [ 441.296813] name failslab, interval 1, probability 0, space 0, times 0 [ 441.308135] CPU: 0 PID: 30782 Comm: syz-executor7 Not tainted 4.18.0+ #190 [ 441.315162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.324520] Call Trace: [ 441.327141] dump_stack+0x1c9/0x2b4 [ 441.330793] ? dump_stack_print_info.cold.2+0x52/0x52 [ 441.336005] ? trace_hardirqs_on+0x10/0x10 [ 441.340270] should_fail.cold.4+0xa/0x11 [ 441.344357] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.349528] ? d_instantiate_anon+0x30/0x30 [ 441.353871] ? print_usage_bug+0xc0/0xc0 [ 441.357961] ? do_raw_spin_unlock+0xa7/0x2f0 [ 441.362392] ? graph_lock+0x170/0x170 [ 441.366237] ? graph_lock+0x170/0x170 [ 441.370069] ? find_held_lock+0x36/0x1c0 [ 441.374170] ? check_same_owner+0x340/0x340 [ 441.378540] ? rcu_note_context_switch+0x730/0x730 [ 441.383525] __should_failslab+0x124/0x180 [ 441.387784] should_failslab+0x9/0x14 [ 441.391607] kmem_cache_alloc_node_trace+0x26f/0x770 [ 441.396767] __get_vm_area_node+0x12d/0x390 [ 441.401126] __vmalloc_node_range+0xc4/0x760 [ 441.405589] ? vmx_vm_alloc+0x13/0x20 [ 441.409418] ? graph_lock+0x170/0x170 [ 441.413231] ? lock_acquire+0x1e4/0x540 [ 441.417226] ? vmx_vm_alloc+0x13/0x20 [ 441.421042] vzalloc+0x6f/0x80 [ 441.424252] ? vmx_vm_alloc+0x13/0x20 [ 441.428072] vmx_vm_alloc+0x13/0x20 [ 441.431727] kvm_dev_ioctl+0x291/0x1b10 [ 441.435729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.441280] ? _parse_integer+0x13b/0x190 [ 441.445447] ? graph_lock+0x170/0x170 [ 441.449266] ? kvm_debugfs_release+0x90/0x90 [ 441.453702] ? _parse_integer+0x190/0x190 [ 441.457875] ? graph_lock+0x170/0x170 [ 441.461689] ? lock_release+0xa30/0xa30 [ 441.465692] ? find_held_lock+0x36/0x1c0 [ 441.469778] ? lock_downgrade+0x8f0/0x8f0 [ 441.474030] ? kasan_check_read+0x11/0x20 [ 441.478189] ? rcu_is_watching+0x8c/0x150 [ 441.482355] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 441.487051] ? __fget+0x4d5/0x740 [ 441.490526] ? ksys_dup3+0x690/0x690 [ 441.494260] ? find_held_lock+0x36/0x1c0 [ 441.498343] ? kasan_check_write+0x14/0x20 [ 441.502595] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 441.507581] ? kvm_debugfs_release+0x90/0x90 [ 441.512056] do_vfs_ioctl+0x1de/0x1720 [ 441.515968] ? __lock_is_held+0xb5/0x140 [ 441.520045] ? ioctl_preallocate+0x300/0x300 [ 441.524462] ? __fget_light+0x2f7/0x440 [ 441.528482] ? fget_raw+0x20/0x20 [ 441.531990] ? __sb_end_write+0xac/0xe0 [ 441.536004] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 441.541555] ? fput+0x130/0x1a0 [ 441.544861] ? ksys_write+0x1ae/0x260 [ 441.548675] ? security_file_ioctl+0x94/0xc0 [ 441.553098] ksys_ioctl+0xa9/0xd0 [ 441.556597] __x64_sys_ioctl+0x73/0xb0 [ 441.560498] do_syscall_64+0x1b9/0x820 [ 441.564402] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.569359] ? syscall_return_slowpath+0x31d/0x5e0 [ 441.574303] ? __switch_to_asm+0x34/0x70 [ 441.578373] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 441.583758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.588613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.593812] RIP: 0033:0x457089 [ 441.597052] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.615964] RSP: 002b:00007f0c720b4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.623696] RAX: ffffffffffffffda RBX: 00007f0c720b56d4 RCX: 0000000000457089 [ 441.630980] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000003 [ 441.638261] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 441.645542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 441.652821] R13: 00000000004ce9b8 R14: 00000000004c50d7 R15: 0000000000000000 [ 441.660520] syz-executor7: vmalloc: allocation failure: 41928 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 441.671826] syz-executor7 cpuset=syz7 mems_allowed=0 [ 441.677181] CPU: 0 PID: 30782 Comm: syz-executor7 Not tainted 4.18.0+ #190 [ 441.684199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.693562] Call Trace: [ 441.696162] dump_stack+0x1c9/0x2b4 [ 441.699809] ? dump_stack_print_info.cold.2+0x52/0x52 [ 441.705017] ? kasan_check_read+0x11/0x20 [ 441.709181] warn_alloc.cold.117+0xb7/0x1bd [ 441.713506] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 441.718365] ? __get_vm_area_node+0x12d/0x390 [ 441.722864] ? __get_vm_area_node+0x12d/0x390 [ 441.727367] ? rcu_read_lock_sched_held+0x108/0x120 [ 441.732388] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 441.737679] ? __get_vm_area_node+0x2da/0x390 [ 441.742185] __vmalloc_node_range+0x472/0x760 [ 441.746686] ? graph_lock+0x170/0x170 [ 441.750488] ? lock_acquire+0x1e4/0x540 [ 441.754478] ? vmx_vm_alloc+0x13/0x20 [ 441.758287] vzalloc+0x6f/0x80 [ 441.761485] ? vmx_vm_alloc+0x13/0x20 [ 441.765295] vmx_vm_alloc+0x13/0x20 [ 441.768944] kvm_dev_ioctl+0x291/0x1b10 [ 441.772943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.778513] ? _parse_integer+0x13b/0x190 [ 441.782685] ? graph_lock+0x170/0x170 [ 441.786530] ? kvm_debugfs_release+0x90/0x90 [ 441.790947] ? _parse_integer+0x190/0x190 [ 441.795135] ? graph_lock+0x170/0x170 [ 441.798938] ? lock_release+0xa30/0xa30 [ 441.802931] ? find_held_lock+0x36/0x1c0 [ 441.807007] ? lock_downgrade+0x8f0/0x8f0 [ 441.811165] ? kasan_check_read+0x11/0x20 [ 441.815313] ? rcu_is_watching+0x8c/0x150 [ 441.819462] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 441.824149] ? __fget+0x4d5/0x740 [ 441.827613] ? ksys_dup3+0x690/0x690 [ 441.831334] ? find_held_lock+0x36/0x1c0 [ 441.835410] ? kasan_check_write+0x14/0x20 [ 441.839651] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 441.844596] ? kvm_debugfs_release+0x90/0x90 [ 441.849021] do_vfs_ioctl+0x1de/0x1720 [ 441.852916] ? __lock_is_held+0xb5/0x140 [ 441.856987] ? ioctl_preallocate+0x300/0x300 [ 441.861408] ? __fget_light+0x2f7/0x440 [ 441.865385] ? fget_raw+0x20/0x20 [ 441.868870] ? __sb_end_write+0xac/0xe0 [ 441.872861] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 441.878396] ? fput+0x130/0x1a0 [ 441.881698] ? ksys_write+0x1ae/0x260 [ 441.885508] ? security_file_ioctl+0x94/0xc0 [ 441.889923] ksys_ioctl+0xa9/0xd0 [ 441.893388] __x64_sys_ioctl+0x73/0xb0 [ 441.897286] do_syscall_64+0x1b9/0x820 [ 441.901179] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.906122] ? syscall_return_slowpath+0x31d/0x5e0 [ 441.911054] ? __switch_to_asm+0x34/0x70 [ 441.915120] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 441.920492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.925343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.930533] RIP: 0033:0x457089 [ 441.933733] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:48:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x6f00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:40 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:40 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa904000000000000) [ 441.952637] RSP: 002b:00007f0c720b4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.960353] RAX: ffffffffffffffda RBX: 00007f0c720b56d4 RCX: 0000000000457089 [ 441.967632] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000003 [ 441.974899] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 441.982201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 441.989467] R13: 00000000004ce9b8 R14: 00000000004c50d7 R15: 0000000000000000 [ 441.997165] Mem-Info: [ 441.999668] active_anon:77988 inactive_anon:346 isolated_anon:0 [ 441.999668] active_file:9259 inactive_file:10388 isolated_file:0 [ 441.999668] unevictable:0 dirty:249 writeback:0 unstable:0 [ 441.999668] slab_reclaimable:9641 slab_unreclaimable:119182 [ 441.999668] mapped:71680 shmem:358 pagetables:949 bounce:0 [ 441.999668] free:1311256 free_pcp:444 free_cma:0 [ 442.033542] Node 0 active_anon:314164kB inactive_anon:1384kB active_file:37036kB inactive_file:41552kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286820kB dirty:996kB writeback:0kB shmem:1432kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 299008kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 442.062363] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 442.088614] lowmem_reserve[]: 0 2844 6351 6351 [ 442.093313] Node 0 DMA32 free:2915892kB min:30192kB low:37740kB high:45288kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2916644kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:752kB local_pcp:652kB free_cma:0kB [ 442.121102] lowmem_reserve[]: 0 0 3507 3507 [ 442.125540] Node 0 Normal free:2310916kB min:37224kB low:46528kB high:55832kB active_anon:314068kB inactive_anon:1384kB active_file:37040kB inactive_file:41612kB unevictable:0kB writepending:1056kB present:4718592kB managed:3591240kB mlocked:0kB kernel_stack:5440kB pagetables:3848kB bounce:0kB free_pcp:892kB local_pcp:352kB free_cma:0kB [ 442.155606] lowmem_reserve[]: 0 0 0 0 [ 442.159516] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 442.173751] Node 0 DMA32: 1*4kB (M) 4*8kB (UM) 5*16kB (UM) 4*32kB (M) 3*64kB (UM) 3*128kB (M) 5*256kB (UM) 3*512kB (UM) 2*1024kB (UM) 3*2048kB (UM) 709*4096kB (M) = 2915892kB [ 442.189693] Node 0 Normal: 4189*4kB (UME) 3557*8kB (UME) 4104*16kB (UME) 1855*32kB (UME) 754*64kB (UM) 322*128kB (UM) 33*256kB (UME) 27*512kB (UME) 53*1024kB (UME) 20*2048kB (UME) 471*4096kB (UM) = 2306428kB 13:48:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x6f000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:41 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 442.208514] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 442.217140] 20020 total pagecache pages [ 442.221196] 0 pages in swap cache [ 442.224722] Swap cache stats: add 0, delete 0, find 0/0 [ 442.230146] Free swap = 0kB [ 442.233558] Total swap = 0kB [ 442.236640] 1965969 pages RAM [ 442.239791] 0 pages HighMem/MovableOnly [ 442.243843] 335021 pages reserved 13:48:41 executing program 6: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:41 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc8070031") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:41 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xa}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:41 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x9300000000000000) 13:48:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc8070031") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:41 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae00, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:41 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='v.at\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:42 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:42 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:42 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7000000000000000) 13:48:42 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa904000000000000) 13:48:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc8070031") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:42 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xc020660b, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:42 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='v/at\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f8571") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:42 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000000000000) 13:48:42 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:42 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:42 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x4008ae06, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7600}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:42 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa904000000000000) 13:48:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f8571") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:42 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:42 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:42 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:42 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa704000000000000) 13:48:42 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae04, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x7600000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:42 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa904000000000000) 13:48:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f8571") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f857150") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:42 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:43 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:43 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xab04000000000000) 13:48:43 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae0a, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:43 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7000000000000000) 13:48:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x72}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:43 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ef", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:43 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f857150") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:43 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x8000000000000000) 13:48:43 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:43 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae09, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x700000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:43 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7000000000000000) 13:48:43 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f857150") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:43 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:43 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7000000000000000) 13:48:43 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae05, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:43 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf0ff) 13:48:43 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="766661740f", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x76}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x0, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:44 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:44 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xc0045878, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:44 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\t', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:44 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:44 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x3) setrlimit(0x9, &(0x7f0000000000)={0x8, 0x541}) 13:48:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x10}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:44 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe00) 13:48:44 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x292000, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000012c0)=0x7f, 0x4) syz_emit_ethernet(0x32, &(0x7f0000000140)={@random="f1cec3281d34", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)={0x0, 0x0, [0x0, 0x0, 0x0, 0xced]}) 13:48:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:44 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x79) 13:48:44 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:44 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:44 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xc0189436, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x900000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:44 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = shmget(0x0, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) getsockopt$inet_buf(r0, 0x0, 0x400000000000485, &(0x7f0000dcffe8)=""/24, &(0x7f0000000000)=0x18) 13:48:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f0000000000)='GPL\x00', 0x4, 0xfb, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:45 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffff7f) 13:48:45 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:45 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae08, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:45 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174c0", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:45 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x3, {{0x2, 0x4e21, @broadcast}}}, 0x88) 13:48:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x73000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:45 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfatl', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 446.120681] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 446.120681] ¾ ̈\‹©) failed (rc=1) 13:48:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f0000000000)='GPL\x00', 0x4, 0xfb, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:45 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf6ffffff00000000) 13:48:45 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:45 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x40049409, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x22000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:45 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x3, {{0x2, 0x4e21, @broadcast}}}, 0x88) 13:48:45 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8), &(0x7f0000000000)='GPL\x00', 0x4, 0xfb, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:45 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x5460, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:45 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174a8", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:45 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x9300) 13:48:45 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x3, {{0x2, 0x4e21, @broadcast}}}, 0x88) 13:48:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x75000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:45 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:45 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661740f", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:45 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xaa04) 13:48:45 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x3, {{0x2, 0x4e21, @broadcast}}}, 0x88) 13:48:46 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xc000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:46 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x5451, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:46 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) [ 447.166649] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 447.166649] ¾ ̈\‹©) failed (rc=-16) 13:48:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:46 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\a', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:46 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa704) 13:48:46 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae02, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:46 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:46 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1c00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:46 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:46 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae0b, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:46 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:46 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2721) 13:48:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x73}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:46 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:46 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:47 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae06, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:47 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:47 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:47 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000000000) 13:48:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7a000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:47 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:47 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x256, &(0x7f0000000040)=""/251, 0x0, 0x1}, 0x48) 13:48:47 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:47 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174fd", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:47 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x8cffffff00000000) 13:48:47 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x5421, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x40000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:47 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:48 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:48 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:48 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x5452, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x10000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:48 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x10000000) 13:48:48 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:48 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:48 executing program 2: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:48 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 449.270602] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 449.270602] ¾ ̈\‹©) failed (rc=-16) 13:48:48 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf0ffffff) 13:48:48 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:48 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae07, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xd}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:48 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000240)) 13:48:48 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000240)) 13:48:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:48 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat&', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:48 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x8000000) 13:48:48 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:48 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6c}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:48 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xaa04) 13:48:49 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000240)) 13:48:49 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:49 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe) 13:48:49 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat"', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:49 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae63, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x300000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:49 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000000)=""/60) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) set_thread_area(&(0x7f0000000040)={0x3f, 0x20000800, 0x400, 0x70a, 0x400f, 0x4, 0x80, 0x80000000, 0x210e, 0x1}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x3, {{0x2, 0x4e21, @broadcast}}}, 0x88) 13:48:49 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x20000000000000) 13:48:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:49 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:49 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xc0045878, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x2300000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:49 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:49 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x6f00000000000000) 13:48:49 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffff7f) 13:48:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:49 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:49 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:49 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:49 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfff0) 13:48:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1500000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:49 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae03, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) [ 450.910993] FAULT_INJECTION: forcing a failure. [ 450.910993] name failslab, interval 1, probability 0, space 0, times 0 [ 450.922542] CPU: 1 PID: 31665 Comm: syz-executor2 Not tainted 4.18.0+ #190 [ 450.929569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.938932] Call Trace: [ 450.941551] dump_stack+0x1c9/0x2b4 [ 450.945224] ? dump_stack_print_info.cold.2+0x52/0x52 [ 450.950436] ? trace_hardirqs_on+0x10/0x10 [ 450.954708] should_fail.cold.4+0xa/0x11 [ 450.958783] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 450.963891] ? __lock_acquire+0x7fc/0x5020 [ 450.968131] ? print_usage_bug+0xc0/0xc0 [ 450.972202] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 450.976897] ? trace_hardirqs_on+0x10/0x10 [ 450.981152] ? find_held_lock+0x36/0x1c0 [ 450.985254] ? check_same_owner+0x340/0x340 [ 450.989591] ? rcu_note_context_switch+0x730/0x730 [ 450.994527] ? __lock_acquire+0x7fc/0x5020 [ 450.998785] ? find_held_lock+0x36/0x1c0 [ 451.002860] __should_failslab+0x124/0x180 [ 451.007127] should_failslab+0x9/0x14 [ 451.010963] kmem_cache_alloc_node_trace+0x26f/0x770 [ 451.016091] ? trace_hardirqs_on+0x10/0x10 [ 451.020345] __get_vm_area_node+0x12d/0x390 [ 451.024686] __vmalloc_node_range+0xc4/0x760 [ 451.029109] ? bpf_prog_alloc+0xe3/0x3e0 [ 451.033179] ? usercopy_warn+0x120/0x120 [ 451.037264] __vmalloc+0x45/0x50 [ 451.040638] ? bpf_prog_alloc+0xe3/0x3e0 [ 451.044710] bpf_prog_alloc+0xe3/0x3e0 [ 451.048610] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 451.053499] ? mpi_free.cold.1+0x19/0x19 [ 451.057582] ? proc_fail_nth_write+0x9e/0x210 [ 451.062088] ? proc_cwd_link+0x1d0/0x1d0 [ 451.066168] bpf_prog_load+0x435/0x1c90 [ 451.070160] ? find_held_lock+0x36/0x1c0 [ 451.074232] ? bpf_prog_new_fd+0x60/0x60 [ 451.078312] ? lock_downgrade+0x8f0/0x8f0 [ 451.082483] ? lock_release+0xa30/0xa30 [ 451.086487] ? check_same_owner+0x340/0x340 [ 451.090832] ? __check_object_size+0x9d/0x5f2 [ 451.095379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 451.100968] __x64_sys_bpf+0x36c/0x510 [ 451.104866] ? bpf_prog_get+0x20/0x20 [ 451.108676] ? ksys_ioctl+0x81/0xd0 [ 451.112324] ? do_syscall_64+0x9a/0x820 [ 451.116310] do_syscall_64+0x1b9/0x820 [ 451.120205] ? finish_task_switch+0x1d3/0x870 [ 451.124711] ? syscall_return_slowpath+0x5e0/0x5e0 [ 451.129660] ? syscall_return_slowpath+0x31d/0x5e0 [ 451.134600] ? __switch_to_asm+0x34/0x70 [ 451.138689] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 451.144080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.148936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.154141] RIP: 0033:0x457089 [ 451.157342] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.176767] RSP: 002b:00007f6249244c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 451.184500] RAX: ffffffffffffffda RBX: 00007f62492456d4 RCX: 0000000000457089 [ 451.191785] RDX: 0000000000000048 RSI: 00000000200ba000 RDI: 0000000000000005 [ 451.199055] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 451.206328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 451.213598] R13: 00000000004cb328 R14: 00000000004c3028 R15: 0000000000000000 [ 451.221003] syz-executor2: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 451.231992] syz-executor2 cpuset=syz2 mems_allowed=0 [ 451.237306] CPU: 1 PID: 31665 Comm: syz-executor2 Not tainted 4.18.0+ #190 [ 451.244327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.253698] Call Trace: [ 451.256303] dump_stack+0x1c9/0x2b4 [ 451.259979] ? dump_stack_print_info.cold.2+0x52/0x52 [ 451.265214] ? kasan_check_read+0x11/0x20 [ 451.269402] warn_alloc.cold.117+0xb7/0x1bd [ 451.273782] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 451.278647] ? __get_vm_area_node+0x12d/0x390 [ 451.283158] ? __get_vm_area_node+0x12d/0x390 [ 451.287695] ? rcu_read_lock_sched_held+0x108/0x120 [ 451.292754] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 451.298049] ? trace_hardirqs_on+0x10/0x10 [ 451.302320] ? __get_vm_area_node+0x2da/0x390 [ 451.306851] __vmalloc_node_range+0x472/0x760 [ 451.311363] ? usercopy_warn+0x120/0x120 [ 451.315451] __vmalloc+0x45/0x50 [ 451.318857] ? bpf_prog_alloc+0xe3/0x3e0 [ 451.322929] bpf_prog_alloc+0xe3/0x3e0 [ 451.326838] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 451.331718] ? mpi_free.cold.1+0x19/0x19 [ 451.335808] ? proc_fail_nth_write+0x9e/0x210 [ 451.340331] ? proc_cwd_link+0x1d0/0x1d0 [ 451.344408] bpf_prog_load+0x435/0x1c90 [ 451.348427] ? find_held_lock+0x36/0x1c0 [ 451.352560] ? bpf_prog_new_fd+0x60/0x60 [ 451.356646] ? lock_downgrade+0x8f0/0x8f0 [ 451.360810] ? lock_release+0xa30/0xa30 [ 451.364808] ? check_same_owner+0x340/0x340 [ 451.369147] ? __check_object_size+0x9d/0x5f2 [ 451.373702] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 451.379280] __x64_sys_bpf+0x36c/0x510 [ 451.383185] ? bpf_prog_get+0x20/0x20 [ 451.387012] ? ksys_ioctl+0x81/0xd0 [ 451.390661] ? do_syscall_64+0x9a/0x820 [ 451.394671] do_syscall_64+0x1b9/0x820 [ 451.398580] ? finish_task_switch+0x1d3/0x870 [ 451.403123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 451.408086] ? syscall_return_slowpath+0x31d/0x5e0 [ 451.413034] ? __switch_to_asm+0x34/0x70 [ 451.417141] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 451.422538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.427411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.432611] RIP: 0033:0x457089 [ 451.435818] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.454760] RSP: 002b:00007f6249244c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 451.462491] RAX: ffffffffffffffda RBX: 00007f62492456d4 RCX: 0000000000457089 [ 451.469771] RDX: 0000000000000048 RSI: 00000000200ba000 RDI: 0000000000000005 [ 451.477052] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 451.484331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 451.491616] R13: 00000000004cb328 R14: 00000000004c3028 R15: 0000000000000000 [ 451.498973] Mem-Info: [ 451.501481] active_anon:81993 inactive_anon:341 isolated_anon:0 [ 451.501481] active_file:9318 inactive_file:10406 isolated_file:0 [ 451.501481] unevictable:0 dirty:122 writeback:0 unstable:0 [ 451.501481] slab_reclaimable:9706 slab_unreclaimable:120750 [ 451.501481] mapped:71707 shmem:352 pagetables:1025 bounce:0 [ 451.501481] free:1305570 free_pcp:356 free_cma:0 [ 451.535296] Node 0 active_anon:328972kB inactive_anon:1364kB active_file:37272kB inactive_file:41624kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286828kB dirty:488kB writeback:0kB shmem:1408kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 296960kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 451.563631] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 451.589832] lowmem_reserve[]: 0 2844 6351 6351 [ 451.594534] Node 0 DMA32 free:2915892kB min:30192kB low:37740kB high:45288kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2916644kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:752kB local_pcp:100kB free_cma:0kB [ 451.622325] lowmem_reserve[]: 0 0 3507 3507 [ 451.626743] Node 0 Normal free:2287172kB min:37224kB low:46528kB high:55832kB active_anon:330380kB inactive_anon:1364kB active_file:37272kB inactive_file:41624kB unevictable:0kB writepending:488kB present:4718592kB managed:3591240kB mlocked:0kB kernel_stack:5568kB pagetables:4100kB bounce:0kB free_pcp:720kB local_pcp:552kB free_cma:0kB [ 451.656696] lowmem_reserve[]: 0 0 0 0 [ 451.660601] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 451.674341] Node 0 DMA32: 1*4kB (M) 4*8kB (UM) 5*16kB (UM) 4*32kB (M) 3*64kB (UM) 3*128kB (M) 5*256kB (UM) 3*512kB (UM) 2*1024kB (UM) 3*2048kB (UM) 709*4096kB (M) = 2915892kB [ 451.690383] Node 0 Normal: 3264*4kB (UE) 2491*8kB (UME) 4148*16kB (UME) 1877*32kB (UME) 758*64kB (UM) 321*128kB (UM) 23*256kB (UME) 19*512kB (ME) 53*1024kB (UME) 19*2048kB (UME) 471*4096kB (UM) = 2287032kB [ 451.709132] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 451.717753] 20101 total pagecache pages [ 451.721781] 0 pages in swap cache [ 451.725275] Swap cache stats: add 0, delete 0, find 0/0 [ 451.730679] Free swap = 0kB [ 451.733743] Total swap = 0kB [ 451.736816] 1965969 pages RAM [ 451.739977] 0 pages HighMem/MovableOnly [ 451.744033] 335021 pages reserved 13:48:50 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:50 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:50 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:50 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7300}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:50 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x5450, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:51 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4ab) [ 451.894654] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 451.894654] ¾ ̈\‹©) failed (rc=-16) 13:48:51 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:51 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617419", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x10, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:51 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x2200}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:51 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x8]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:51 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0x4020940d, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:51 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="766661741d", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0xf, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:51 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:51 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:51 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:51 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae13, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1400}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:51 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000000000) 13:48:51 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000240)) 13:48:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000143, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:51 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:51 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x40000) 13:48:51 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x68) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:51 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:51 executing program 6 (fault-call:3 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000109, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 452.903772] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 452.903772] ¾ ̈\‹©) failed (rc=-16) 13:48:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x4000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:52 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x78260000) 13:48:52 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x2000009b, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:52 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:48:52 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x10000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:52 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:52 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c04, &(0x7f0000000240)) 13:48:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000193, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:52 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:52 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:52 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7900000000000000) 13:48:52 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x9003000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x75}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 453.494589] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 453.494589] ¾ ̈\‹©) failed (rc=-16) 13:48:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x2000019d, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:53 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:53 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1274, &(0x7f0000000240)) 13:48:53 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:53 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffff00000000) 13:48:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x3f9, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:53 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7000000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x21}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:53 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1268, &(0x7f0000000240)) 13:48:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000170, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:53 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174f0", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:53 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x600000) 13:48:53 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfatl', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x200000e6, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:53 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x700000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7d}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:53 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4020940d, &(0x7f0000000240)) 13:48:53 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174fd", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x14, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:53 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:53 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa804) 13:48:53 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x76000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:53 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x125d, &(0x7f0000000240)) 13:48:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x4, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:53 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x6000) 13:48:53 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174fa", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:54 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x8f4) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:54 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xd00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:54 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x127b, &(0x7f0000000240)) 13:48:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x7, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:54 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000) 13:48:54 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:54 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:54 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x3) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:54 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1278, &(0x7f0000000240)) 13:48:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6f000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:54 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x5451, &(0x7f0000000240)) 13:48:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x200000b1, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:54 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174c0", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:54 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617402", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:54 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7400) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:54 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2b27000000000000) [ 455.631823] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 455.631823] ¾ ̈\‹©) failed (rc=-16) 13:48:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x6, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1f00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:55 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:55 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x401070c9, &(0x7f0000000240)) 13:48:55 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x8, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:55 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x3f00000000000000) 13:48:55 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xfeffffff00000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:55 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\n', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1600}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000054, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:55 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 456.319419] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 456.319419] ¾ ̈\‹©) failed (rc=1) 13:48:55 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x60000000000000) 13:48:55 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000178, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:55 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x100000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x22}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:55 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c02, &(0x7f0000000240)) [ 456.590300] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 456.590300] ¾ ̈\‹©) failed (rc=1) 13:48:56 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:56 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617415", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x2000006a, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:56 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfatH', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:56 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:56 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x20000000) 13:48:56 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x127e, &(0x7f0000000240)) 13:48:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xc}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:56 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x5450, &(0x7f0000000240)) 13:48:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0xa, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 457.152639] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 457.152639] ¾ ̈\‹©) failed (rc=1) 13:48:56 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ab", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:56 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:56 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:56 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffb) 13:48:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x13, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1400000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:56 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:56 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x127f, &(0x7f0000000240)) 13:48:56 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\'', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x11, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:56 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf5ffffff00000000) 13:48:56 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x48) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:56 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6d000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:56 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0xc0481273, &(0x7f0000000240)) 13:48:56 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x3, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 457.912371] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 457.912371] ¾ ̈\‹©) failed (rc=1) 13:48:57 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:57 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2a8) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:57 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x3f000000) 13:48:57 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0xc0045878, &(0x7f0000000240)) 13:48:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x15000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:57 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x3f1, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:57 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1263, &(0x7f0000000240)) 13:48:57 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:57 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:57 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xab04) 13:48:57 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4c00000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7000000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:57 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x301, &(0x7f0000000240)) 13:48:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x3fe, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:57 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174fe", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:57 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7826) 13:48:57 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xfeffffff) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 458.707271] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 458.707271] ¾ ̈\‹©) failed (rc=-16) 13:48:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0xc, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:57 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xffffffff00000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:58 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:58 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0xc0101282, &(0x7f0000000240)) 13:48:58 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:58 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2127000000000000) 13:48:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x200000ee, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:58 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:58 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xd000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:58 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c07, &(0x7f0000000240)) 13:48:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x2, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:58 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617410", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:58 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:58 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 459.465671] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 459.465671] ¾ ̈\‹©) failed (rc=1) 13:48:58 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xaa04000000000000) 13:48:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1b00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:58 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x125e, &(0x7f0000000240)) 13:48:59 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x20000093, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:59 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat#', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:59 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x5460, &(0x7f0000000240)) 13:48:59 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617493", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:59 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x700) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:59 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7000) 13:48:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xb00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:59 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x401870c8, &(0x7f0000000240)) 13:48:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x9, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:59 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1100000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:59 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x7900) 13:48:59 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:59 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x400000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 460.192747] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 460.192747] ¾ ̈\‹©) failed (rc=-16) 13:48:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0xe, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:59 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:48:59 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c05, &(0x7f0000000240)) 13:48:59 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfato', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:59 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe926) 13:48:59 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:48:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0xd, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:59 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2003000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:48:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x4000000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:48:59 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1260, &(0x7f0000000240)) 13:48:59 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174f4", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:48:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0xb, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:48:59 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x800000000000000) 13:49:00 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:00 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x700}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:00 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:00 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:00 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1279, &(0x7f0000000240)) 13:49:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x12, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:00 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe926000000000000) 13:49:00 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:00 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x70) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:00 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfatL', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7600}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:00 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x125f, &(0x7f0000000240)) 13:49:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3f3, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:00 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:00 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 461.622953] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 461.622953] ¾ ̈\‹©) failed (rc=1) 13:49:00 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xa804000000000000) 13:49:00 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x80ffff) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x9}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xff00, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:01 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:01 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c08, &(0x7f0000000240)) 13:49:01 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:01 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:01 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4c00) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:01 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x10) 13:49:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xf}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:01 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 462.266450] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 462.266450] ¾ ̈\‹©) failed (rc=1) 13:49:01 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:01 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf6ffffff) 13:49:01 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x74000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7600000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:01 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x40081271, &(0x7f0000000240)) 13:49:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:01 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 462.506640] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 462.506640] ¾ ̈\‹©) failed (rc=-16) 13:49:01 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:01 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x6f00) 13:49:01 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:01 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0xc020660b, &(0x7f0000000240)) 13:49:01 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:01 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xe000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 462.992526] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 462.992526] ¾ ̈\‹©) failed (rc=1) 13:49:02 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x5452, &(0x7f0000000240)) 13:49:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x18e2e4, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:02 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:02 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xe00000000000000) 13:49:02 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:02 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6800) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xb00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:02 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x127d, &(0x7f0000000240)) [ 463.294603] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 463.294603] ¾ ̈\‹©) failed (rc=-16) 13:49:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3eb, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:02 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:02 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:02 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6c) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:02 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x2, &(0x7f0000000240)) 13:49:02 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2b270000) 13:49:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x13000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:03 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1262, &(0x7f0000000240)) 13:49:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x2, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:03 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:03 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:03 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000000) 13:49:03 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6c000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x71000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xb, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:03 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:03 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x40049409, &(0x7f0000000240)) 13:49:03 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\r', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:03 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:03 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xaa040000) 13:49:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x30, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:03 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xa8020000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1100}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 464.647103] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 464.647103] ¾ ̈\‹©) failed (rc=1) 13:49:03 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:03 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:03 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xfbffffff) 13:49:03 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x3000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:03 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c01, &(0x7f0000000240)) 13:49:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x15}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x20001, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:04 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:04 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:04 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c09, &(0x7f0000000240)) 13:49:04 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:04 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000) 13:49:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x19e, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:04 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x68000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6d}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3ef, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 465.364867] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 465.364867] ¾ ̈\‹©) failed (rc=1) 13:49:04 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x4) 13:49:04 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:04 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:04 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0xc0045878, &(0x7f0000000240)) 13:49:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:04 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xf408) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:05 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:05 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:05 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffffffff0700) 13:49:05 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x5421, &(0x7f0000000240)) 13:49:05 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3f7, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:05 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x74) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1a00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:05 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c00, &(0x7f0000000240)) 13:49:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x13, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:05 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:05 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0xf4ffffff00000000) 13:49:05 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:05 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1f00000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xc00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:05 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x80081270, &(0x7f0000000240)) 13:49:05 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:05 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:05 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x6f000000) 13:49:05 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x401070ca, &(0x7f0000000240)) 13:49:05 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:05 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x200000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x700000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:05 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1264, &(0x7f0000000240)) 13:49:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xffff8801b841cd98, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:06 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617417", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:06 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 466.947681] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 466.947681] ¾ ̈\‹©) failed (rc=1) 13:49:06 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xa802000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:06 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x93000000) 13:49:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x7, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x900000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:06 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:06 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0xc0189436, &(0x7f0000000240)) 13:49:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x3fe, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:06 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:06 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x300000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:06 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfatz', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:06 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000) 13:49:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x2000000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:06 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x127c, &(0x7f0000000240)) 13:49:06 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0xc, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:06 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:06 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x1) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000280)="f0aceac8114a324513203cc814d75c0c4acace16e9093e4a749ac725b7d915fc9d8a3cef0651ed5838693641ed", 0x2d}, {&(0x7f0000000540)="a145fb65b7027d509f131e90540954b2df214394832d6d46c35f282c269d2aa83d0080d15f7cb2f939c465addab6c0d2f69b1aa2caa3e55bd863be236a52f14e965a4b86e7feea3546542372d10dde730a614128b07d0bb137ce08269b8c46bd3a6a564498ca3966334c5ebd6f55bb28f7210e98858cebebfaf3ce209415e582", 0x80}, {&(0x7f00000005c0)="ec38d7898edde17d0370bb68e6d74f60e9ed3173d40a1915c486f1d0a66428362c79fc4ea7c5bbba22ddce40e012ccb0d1e379e8d11a72b0e448e501e4cb293bb7e2629e56f68eadb95ee80d82912a8e17d42c7a15dc1d54924f6c3cb25794a2f9ece92906cb353417119cea1add28872bc19cf6", 0x74}], 0x3) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) r2 = socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000700)={0x9f, 0x1, 'client0\x00', 0xffffffff80000004, "45c346fab1505dec", "44f1ff0f000000800000db27c2fd08250a0937058fd63a676b90dd3100", 0x9, 0x1004}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000200000093b8635020aa55a2e8ccb55c93510bf971044326037d2b106e85b1d1933a687bbc70dd4d0dfab9b8a605b79834435a268d6796e149568ea49d273e9f628af44f5bac78f0a2308d4e54fa464467f4d6d6226dd40ba55528f5492c4cc9a8f4e5c2800513d4000000000000000000000000000000000000"], &(0x7f0000000140)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r3}) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 467.753655] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 467.753655] ¾ ̈\‹©) failed (rc=-16) 13:49:06 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7a00000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:06 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1277, &(0x7f0000000240)) 13:49:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x74}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 467.970824] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 467.970824] ¾ ̈\‹©) failed (rc=1) 13:49:07 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000170, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:07 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:07 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:07 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x80081272, &(0x7f0000000240)) 13:49:07 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x40000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x66}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:07 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, 0x100}, {0xa, 0x4e20, 0x5, @local, 0x1f}, r1, 0xd9}}, 0x48) 13:49:07 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0xd, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 468.415437] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 468.415437] ¾ ̈\‹©) failed (rc=1) 13:49:07 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000380)={0x8001, 0xff, 0x4, 0x0, 0x0, [], [], [], 0x3, 0x3ff}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000040)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:07 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x76}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:07 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1261, &(0x7f0000000240)) 13:49:07 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:07 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 468.676949] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 468.676949] ¾ ̈\‹©) failed (rc=1) 13:49:08 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000109, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:08 executing program 0: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) sched_setscheduler(r0, 0x0, &(0x7f0000000040)=0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000380)={0x6fcbbb02, 0x100000000, 0x2}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) kcmp(r0, r0, 0x3, r1, r1) socket$can_raw(0x1d, 0x3, 0x1) 13:49:08 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:08 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x320) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7a}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:08 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:08 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x127a, &(0x7f0000000240)) 13:49:08 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1267, &(0x7f0000000240)) 13:49:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3fe, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:08 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:08 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="766661741a", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 469.282858] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 469.282858] ¾ ̈\‹©) failed (rc=1) 13:49:08 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7a) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7300000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:08 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0x2, 0x9, &(0x7f00000000c0)=0xd04a}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x6}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="10000a00000093b8"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x200000ee, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:08 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:08 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x401870cc, &(0x7f0000000240)) 13:49:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x2000006a, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:08 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x4, 0x12) semctl$SEM_INFO(r1, 0x3, 0x13, &(0x7f0000000280)=""/77) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff) 13:49:08 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x600000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7b000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:08 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:08 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x2, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:09 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1276, &(0x7f0000000240)) 13:49:09 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x400000000000) 13:49:09 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:09 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:09 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xb000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:09 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x401070cd, &(0x7f0000000240)) 13:49:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x200000b1, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:09 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:09 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000380)) socket$inet(0x10, 0x7, 0x8) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x200, 0x1, &(0x7f0000000280)=[{&(0x7f0000000480)="faf81e121f36f3e755024773d7f3f0cd188dce43c3ee21b3619f1c436c9c4936e8483b50bf67a705c770d3b3291946b6495907", 0x33, 0x3}], 0x2000, &(0x7f0000000440)='/dev/mixer\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:09 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1269, &(0x7f0000000240)) 13:49:09 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3f1, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:09 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x500) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:09 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174f0", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xc00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:09 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x401870cb, &(0x7f0000000240)) 13:49:09 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:09 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1c3, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000004c0)=0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000380)={0x4, 0x401, 0x400, 0x2, [], [], [], 0x3e, 0x6, 0x800, 0x401, "207ce30c448b6830206e2bffa1969b2a"}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100), &(0x7f0000000140)=0x8) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:09 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x1265, &(0x7f0000000240)) 13:49:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:09 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:09 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x300) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:09 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174fe", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:09 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x40101283, &(0x7f0000000240)) 13:49:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x2100}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:10 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0\x00') ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) r1 = socket$inet(0x10, 0x7, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000013c0)={'eql\x00', {0x2, 0x4e21, @loopback}}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000380)=ANY=[]) write$P9_RREAD(r0, &(0x7f0000000380)={0x100b, 0x75, 0x2, {0x1000, "203fdb536081b0584c02588736676f1295b8aa4eb34b2977e3db0c4deef82291efddc10175a661da302f63b65c6bee6ec53f49e3bab2186771b7ba91dc6db143d6fab400f56a51ea23f541a264f70293e820d944cba768368c4080e9f279f16a62baba39d26c16432d5ba442d8fc9e22ca8e661262c9cf9fb79d77dd5060c675e50b6e0fb5726cc8aa9058807be94ae66172f2e5c615b05deb216c5fa8b58638748d0331f62832ab26eebe3796ccb9f7bf3a1ff844acd2e1b674fe0f9ea784ac548b66773ad8f9b52b7f6bc063e13b85d77d825ad4af66a277c6e2dbf8804c0b439f4582eee7e729ad02f9f835e082004cb6df57cb686211d744a4ebdb69c36e3a4b83fd374d3d0ff5283b95f8d50867e2ad0d1f164fa364baec1e9bf4d2b0a5fbdef4fb0e1bf22e3f53aec077073fd9da48e4acc6ff99bd9d924ef8a6ede076473f7dc409fa5b676fbc1c039ff3eef5f81c79d844c9b790830630f3e5b3e0dd0910236e1127f8821bd8e91790d39d3b4ec04465dfeaf9b17bc7da2bdebb28bf9ead9bab9ecbf9ef0ee29d1874eb8b727fc5cb8b00fc2fe8555307752fd5416a28d715ce72af2efe91d4b713852f3e4cb2749f4a8ed6434ab53385fecc3c7fb670c0971023e376c6575636eb759edf69ccb93b31c2807d5ee2822230594d9239f70866cbaacc873dccf61917fdbec50c305e3df0d1317ec6bf51b694135e553f7b56c5cf95e12d66f97fcccd625a572bc2e693306f9750a99667a8476f6ac5a6604b23a24eb0de9e447b07094e62e61673e7a50c6ad7f6f3c388f2f3e8b626dda0c648756b3319535fc6dd2d22e12c33da3158940d319a815b92ddfe1b39bd0e34d470da59f5220492db8e675b54c57696b45fd7ba3b9fdb5d2726d710b3648c1810c2b90c41c429e0df7e3696cc2aedffe891565db6336ba7c8747a85252f616d34c6c0f651e753de97f66c6d31692a8a021be175dae5bb3e12bdaa8d779aa1076cae72b6a51970a659755dfb6b5e4945d7d3fad9f2822d64cf33874b3b14c4743ac8f1a32e4827ef3b039d19a334f3ace9ed2de15b29735e3955c2cc84f7399a3490331803dda4b47e884c61cd5615799b4e0a7b67c3e3daf88f6a74e706abb7285ecd09694c7b2802280c29abef9d24e3a6f851b45355642757ff8a9b6d29b6b96a93f45201a4f6bd8027d46bb672947f1d13ddcd44f19804b2b997e54f677f5e2e8fe24b418fa99628d6d424a19fbb42f48629fc5adcf0b17683390cf9c1548aaf6df2ad69de2f0ce79ddf4f8c3fd4fdbd88b8a5fe62bc2ed824247742712d7cac9a51b81ea327c3cc146d741a287de60c0b8aade26a590e8adb204e0e723bad712c096e5d0093272a4e7d2ab2e9614bd28d5cb056953881845319232afdf7e08271c5d3e2911002e7a772d6ae948940c5c9edd2179e7bf7b132735a0d5ccac2b85fdc0f59bb47164cdbf10bd0a9ae3a7e1f095c4e92d83a7c5589e083c6d611ab71edf12d1b3911e305095350d265f25a204d86c72ffe4a32815abbe5e6a58bae51c5d9f1204c7e3e54be50a79e88f3aa3bc57218c0f5ad5194862aab32c8594eb2f50b333e7065d11413ee11114d128e9d2632f4d8f752de984099cb01eadfe44237089a9e57f7bbc5e520236da8f9971a45e9a12d672100d053052d2c051c7228bbd2f95e299a5bfa0650aa1da28511bacceb39793505c1e84e2a834ffdedc16500acb17545e875e630e6c4a4279a852c67a94aba28b9ff3a01e2b7caf92405decf21d93674b6b81b1f431129e68936e027f83e8959847c6dcda2381bc85001bc1ad426f53572631e63dc85985fe6a42d3ac1ca98ce04c0d9528cacd7165cac34c423ccf5ec4d9877c0e82ac99ea90b85636f1f92ea6d982e401d18c50c2ee3fd4f96aeb66b01e84c248eaf91d093b890acef4d4f59a2400bd8b68a42d21927c33ea217cd3e7ef9b262dc4025ce1763ca1ab8ee0e3600cf45fb199ac83aacdf980773ad1cda1f5e07433036efe491d736f68b5effc6aef74660524ada26128d8b6c478d98eae849d43c0a78c1ac233050f500c39262db53f3df56b8297bd015f3050e7be3105ddb950cefca3f91f174eb615b88a226bc6baff32aa7182fd70878d9d1887ac71057df8a8e228bc8b6acbe84ce8496654cdbdc9261b43fa693248899459b664d2598e9e1e7cab602d45b8b6afd3f8004c04e846c724ec046d012ad9c97c25dc0f8523e0405750e23e9ea08e41bb8057671a1b19beae522a9211ad15846002f94d1140b05efb2a206d2f7d1d0663429ae1c335ba632eb7a5488f3949f05aa9466a67d3216a960387c5038301f8d35ef07bbd38292e6a31636798851bc47d328201905d9994cebffbb95cd2d1ecea3ac670da0b8c32817dc7b93e29c10e7abaa7d0503b69608f1d2ced14d52fe850783453b7dcfffe83d411bfad6255b293e33f733f066e1f068053c0a6e3b26fae67335eef51c2fd7f0b51e7633acf3fcfae09ae28250cf16974f12c6f14d617bffef9bc7e0aae4b8bb28a83ade67907e2cad31c047e22d3d7f56c5b84ef073d2bfd16b0f0de6146436c7a4c33a5c371b7284687aa67e6a3016765acbfc7a56e652ea17bf335421bbcf6f3229c8b92abe512dbc2e8cc0f4ad14ccabe00141ca97cf5ab3103fe1ad3e0a7af2088e12a6f65c699b113b97382bcb4a60f8b62d566a9e79992780d0bec38176942985fc53ec82213da033946bbcaf41bf42ffecc1dbdabd95b94846f7b112f72d9f921cc3cc850ead5059c54772bae86f33238e8b5d37054cbe10dc6c204bc3ebf5948cf5155346023feddfac3f0d0b587fc5f0de4a387433c779ec7f7cb9a3b21ba275afd417c19293f6384c66c7d546f6ac2a3751fbc08f9228e2a31af0be619f525e95ef13e9d7e59c1db55d7a674bd98ad46753118e8984b42638e567fa27daac54ffefb6cf2e46a51ad5dfa3c7b818af9bb7c0be9941d32999a81149454d6243d64cde6019fa6e9fbee343479726dee74c87ae55b67a970b1f22a8ecba60cf689a8765fe1d804cfa20c978f40d4e4d93f80fe5766029e996a80987eb111b73a553c419c85e72ec6584d534d1a55f7e326a170cf1f892de51cf7f50de5962da135732c20b6e8faac54e35a95318c925716383f7f6332ae1ac00f832ec0e7162c8c39336f29dabcaf02785cc58c7132426b4192a055b02d6c280c54f554485e0d08138b172598d39a112386a7b75387f49c04452807ece334cb961644242682893bc12e2fb79c69248beeb94ecbe8faff150e49d73592554b59b05f39e966222ffe6fea68708c279ea9617a1eba3049516d24ee662ebbe2363d4f1c694c23decc5a298b1a0587bc324f9b040615b0c3eb0a5514bcefce0db1983779e6befd2044678cbb45c8677c17a385ca2ffb173aec0dc6d4637692c8e330f85003f98d189a9cb14826adfdbd06800d920fd46dc17edfc391703df1ea5418640a5a403ce27375c286939ad271f9f467c931d8a39641cdeef021cbf7fce8c738c402345215737175ae06092456678e42cc37d4d06278f1f2d32af8cc42b9bafea0743ecf098217aa09c4c43fb356a2d3d7590158684cd925d136f0712d67f98c44b61a914cb9c0c8dca602dcf27f9932b1c4cb1768cb61f1a4ae84837d66eb5df3658d8b3243ce66637e37698133461db12fef6162813dd30371bbbd03b656a12d0449dbfa70bc5a666a7f57fb45cb03bb89bdab8ea17fcf494722feaa3a6c813a0fec2fa5e9d45956535a6e17df9cfe0f206b7c95cd9aecbdc42e50b2ce7b21dc49c268b1f03bfcc231665b0d1a808ee29c7f8b18024618bd21babb2056a101222664aa91fee3adb9a30fe4dbd6424ca873dcae2b574bf0a7e20b345323ec2ee684e7d59a2fea344ed1f9d0b7aef55eb804d7293b45047fcd0418a7bdb0e826b17d498c0ac7a5438f59021782ab070e4bcaca36b230239869294df214d04e97d1ccef3ef9adcff546882feb1d824b44117642bcf852e1f0384fd8b0f7b27f1c6182bbe143e504a550ce7931328fef48138fe6bfcdad956116b93e64c5a93fab0315783d7e7a94c8fa290a9f4714e9ed48e457c1c08684f1727e47529cb6dbe147dfa04024ca629dff00d38c23262925d005f8e72ecae81e209be5afb9718ffc27e8869d9c842d85453e5055ff6c2fe530867a1bca2f152a52e0fd48913a699cf82ec05e57623bd122c2a966fd7ff1a51737d72895ac54085aa9711da6641dcc335770fcf282d3f7366059874bf6a9b64ee1ac12c197e6bea7b574c2b3e8975552b181efb3c8064c967b01c5ae3dce7a2685eb1b0aea9b46b3cd5afc7bab1f01688c07acaa37f2ba2bf3fbcfec193817d9ba607570b78cb02702701cd3e4bb0f4655d8583079d8800641643f2885f53b5436632e5a45e7d7c0598acbfaed7e8fbc425ef041e5479f25daf8e1cb787d16f4146dd07a479075ffea9a37f730a12ea36385a48b815f51a7855b49d225f99da612f7191b86bc173c739450f31e742c8b5d913b3afd215b9c67f566e30f8f412c0759e91eda6720f6f0eb641c460d4cf98a52748c86798b84d248e88e5c3e1526a5da5f0fc721751855c153a16a013bb4f3678d126a05aa5ba50788ed33522cec9ed406ca9d6f91cb64c10c45c7288600115a6e02fd94a8f00e0081dd347789f1d24ca9e209d0c36e5136321c4f4ee0908b207d19ee8844f9c3a226d2cdf7b785352a2303f628aaac37284ee3d8382eacc19ffaa55afbcb9210d337cbd94373042d7f039d34e9a5941ee911f000aca6b8adc27de60f896730d2711d76f1fbba5a86790120757da0b873cd0db21a105ed3e353678e3a4cd70e1fd5b7ba3284b2a4e6107e076d8197a1704642fc41425b2051f43b0e103c0cd5b5b4c6d0d25697ac621d6ed8c05e3814cadccb0012aa92569444c853b393515a01803288f6334621514c230b1187fbf9dc24d59f6a3d85f4d6e5ff1972652075fbe1e489da8fd131bdea8647fa8826363154c10a7d2f8a15633c609ae812b4c02bbab06865bc690c7a3d248d2817f799ed4691cc46d16fb8b230a40c2ddb038617b823a21df4561877b3c6296de6e2fe6ad1489ae08a2b1ef6221cb5e7fd6f1af5be74459d9e870048d451928c19937116d39720632ea634960d32dba3718010a5e4975fbe8ad32ca3b8dd5871564d249bcefcb88603543652332349132fa9a4b433a926ea21ea093468c41f0afa63d97e3ca9ac7531db087d3e40e7dffd87d905bf6ec8e18c969183705e80e5f7fc665081afb45f6212e9fb625f44206f84130dbc98337d29aeb6b464cf0fe429934bf44987632a14d6b9b6f5c7b45a732f814516070b98f7e3a8ebe00185c589a1940a4cd4f30df70b3ed2e915836956249e2ba837c099be4b816f5c4b4af21919b5bb8fc70665a2a5e36efec9ab06a39cc9e2c5d4fe0a6c08158301307b3d92f369577b698db349a9598ff4c6302f08428805f3be8bfd0d76c9e30cecba1579b8c3dc02043b6e139e986ab6e75f373509918198b0cb97ed1078713fff3cbc66efd146d7f0d6aeaf2b6e5d20c2bbe0c64000d6b291caa04d98996085372961cdcbd0dd0317815f08ceab993f0e2f0ad68c74bcb5f872efe845f88780db85d1759196c227af7f7598453463f1666e0a4d38ded77df8a1a009bca962fc82c4b1d127f7d01b6ea253cc0d820a1be2f94ccb27a311ac03b9f7dcc9bcda250d3535e214afc79802585de41835ad26ee11b1d25f5758d12da75995a37d4c31c1e5e1a16aff6ae6b85a6b2c04dfd627a"}}, 0x100b) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000420fef3d16c403ff92b8"], &(0x7f0000000140)=0xc) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000093, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:10 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c06, &(0x7f0000000240)) 13:49:10 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:10 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:10 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7a00) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:10 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7a00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:10 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/64, ""/32, [], 0x0}) 13:49:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000054, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:10 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x40000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:10 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r3 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x1010, 0xffffffffffffff9c, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x3, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x78, 0x0, &(0x7f0000000400)=[@clear_death={0x400c630f, 0x3, 0x2}, @increfs_done={0x40106308, r1, 0x4}, @reply_sg={0x40486312, {{0x3, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x48, 0x10, &(0x7f0000000380)=[@fd={0x66642a85, 0x0, r2}, @flat={0x77682a85, 0x10a, r3}, @fd={0x66642a85, 0x0, r4, 0x0, 0x1}], &(0x7f00000002c0)=[0x48, 0x78]}, 0x6}}, @release], 0x8b, 0x0, &(0x7f0000000480)="fe8f8857d197c7f9edfab75e24565c468ac032a258409e2b94495379428718f5764cd5122d210758b0d0746444e5273e28ef5c3fe270f394ccf0cf7d02c81f2232c104ef34b18c35e405999a616ece37a2c148787d9f7087236319e89fde68ff5645582d01c9dba8f079f3a4ab303e8b1ccbd015f63b51d28d3f99079b00b29447302f83d58846e4797e85"}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r5, 0x8080aea1, &(0x7f0000000300)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000580)={{0x7004, 0x0, 0xf, 0x200, 0x6, 0xbc1, 0x4, 0x80000001, 0x5, 0x9, 0x1f, 0x6f}, {0x5000, 0x1000, 0xa, 0x53, 0xfffffffffffffffa, 0x2, 0x1, 0xea4, 0x2, 0xe4, 0x1ff, 0x7f}, {0x10000, 0xf000, 0xc, 0x1ff, 0x3ff, 0xf8b, 0x7, 0x800, 0x3, 0xffff, 0x1b20f4d9, 0x1f}, {0x15000, 0x1f004, 0x3, 0x40400000000, 0x4, 0x4, 0x9, 0x0, 0x5, 0x9, 0x4, 0x9}, {0x2, 0x4000, 0xf, 0x2, 0xce, 0xcc, 0x2c, 0x0, 0x6, 0x100000001, 0x8, 0x4}, {0x1000, 0x0, 0xb, 0x6, 0x6, 0x6c, 0x7, 0x7f, 0x8bbc, 0x9, 0x1}, {0xf000, 0x1f005, 0x1e, 0x7e, 0x3ff, 0x9, 0x8, 0x26c9, 0x7, 0x6, 0x100, 0x80000000}, {0x3000, 0x1000, 0x1d, 0x6, 0xffff, 0x8, 0xda3, 0x8, 0x8, 0x9, 0x63ee, 0x2c7f4b14}, {0xf002, 0x2000}, {0x4000, 0x1000}, 0x10, 0x0, 0x6000, 0x122152, 0x2, 0x901, 0x100000, [0x400, 0x8, 0xfff, 0x8001]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000000c0)='./file1\x00', 0x0) 13:49:10 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:10 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/64, ""/32, [], 0x0}) 13:49:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x22000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:10 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000143, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:11 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0)) close(r1) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x700000000000}]) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:11 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174fc", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:11 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:11 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:11 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) r1 = socket$inet(0x10, 0x7, 0x8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="26fd0000000093b8"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1b000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x2000019d, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:11 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:11 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x40) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:11 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:11 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174fe", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:11 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x500000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1c00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:11 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2987, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x9, @empty, 0x100000001}, {0xa, 0x4e22, 0x0, @remote, 0x400000000}, 0x7, [0x0, 0x8, 0x1, 0x94, 0x9, 0x401, 0x7, 0x3f]}, 0x5c) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) timerfd_gettime(r1, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000840)) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000200)={0x80000001, 0x2, 0x4}) [ 472.483832] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 472.483832] ¾ ̈\‹©) failed (rc=-16) 13:49:11 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0xf, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:11 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:11 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x4, 0xb1}) 13:49:11 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617402", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:11 executing program 6: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x81, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x89e3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={r1, 0x7}, &(0x7f0000000340)=0x8) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040)={0x80000000, 0x8, 0x5, 0x3, 0x909}, 0x14) 13:49:11 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x17}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x14, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 472.971198] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 472.971198] ¾ ̈\‹©) failed (rc=1) 13:49:12 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:12 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) write$binfmt_misc(r0, &(0x7f0000000480)={'syz1', "0a8b6ab0060f452bf5fe71ebe96c2fe3a0615d7fa74308a32d0f29898eee4c42b435f7e4568dca7f14240556c9f1b49e725520fffbdf43d19249c0d73e9e09fd0f13be7ddf51690b4d2380f4e8d58849acd9f076a17a07d89847382dc08939d1d6d79136ea9024e667a5d8bb190815cb47c809e588a272d8d1cfe2a5fb842c033fe2c7d71ed738f185f1d102ca02c669cf78443040015807dbba61903d026065a4bdd4dd4f857c476d92a58d1452626b773873b0b7755c8640de9975761903abd2da293dfd7ff2d87bb0910b03d59294425a662b8d6a1b667b5018f4d3ef8a15992f0c700cfb0fbf2a9829f2633a38"}, 0xf3) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x36}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000580)={r1, @in6={{0xa, 0x4e20, 0x2, @remote, 0x3a9a8000000000}}, 0x1, 0xffffffffffffffff}, 0x90) recvmmsg(r0, &(0x7f0000004280)=[{{&(0x7f0000000640)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/84, 0x54}], 0x1, &(0x7f0000000740)=""/4096, 0x1000, 0x10000}, 0x1}, {{&(0x7f0000001740)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000000180)=""/36, 0x24}, {&(0x7f00000017c0)=""/74, 0x4a}, {&(0x7f0000001840)=""/213, 0xd5}, {&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/214, 0xd6}, {&(0x7f0000002a40)=""/119, 0x77}, {&(0x7f0000002ac0)=""/240, 0xf0}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/111, 0x6f}], 0xa, &(0x7f0000003d00)=""/15, 0xf, 0x8}}, {{&(0x7f0000003d40)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003dc0)=""/135, 0x87}], 0x1, &(0x7f0000003ec0)=""/177, 0xb1, 0x5}, 0x8}, {{&(0x7f0000003f80)=@alg, 0x80, &(0x7f0000004240)=[{&(0x7f0000004000)=""/101, 0x65}, {&(0x7f0000004080)=""/76, 0x4c}, {&(0x7f0000004100)=""/129, 0x81}, {&(0x7f00000041c0)=""/112, 0x70}], 0x4, 0x0, 0x0, 0x8}, 0x2865}], 0x4, 0x40, &(0x7f0000004380)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="45fb855e03000000b8bcb5a439e6eaf6017c2013d3f5198172bdd925ae50b6993edcf4da72afb18d82b3dc7e24eb05ea317090b6498837d330265d9a9030dbbcf0a7d9f90ba513bac2dd38c0bb1fccd8d2b50025280ef7500345c8154dc14f0604c680470b494a24e4b52d241e5005279ac0bc87504b8ceb20dae9adbdc70cb859b90aa2a872278e05d9a9a9a41f7ba27a12ac02905aba2575dc4b99b1486a7ea364578b76b5b7a157ab47ba0fe82ceda8749e0e444e30b9bae696abe5a3012938c657ca9b05a01ab677482b0c13bd1d08781167b3674efc1c84d45fe7e8f0da4e7122a6e6edfa850c6a8402"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:12 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1b5c4cf144e23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b618ad791137e2982fcce5d747a3131995a", [0x6]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x4, &(0x7f0000000300)=[{&(0x7f00000003c0)="971a18831e6a5de4973cd9c1b0af0c846c08e2006c29298c2aa4fcc976aa0f51efc8bdd54f3715b41dbc8e9d4d245670843adad806a3f8d037359d9eecfc3a121902cdebcac812720838423c4e40709f3c967d7fb587a27faaa91947a2dfd241c53ce3ee8edb682b97602f34032c1c1fbf3d57ce224d405ef3224377892cd005802cd3cea7d67eb8d0354496d14fd4a1afe2aed0f55fac2bbff132e8aa72d0477d68d183eafa7a05d696463402a9481a9d105b4029f744cd9a189d6913ecf4409a4e1cc97ef24723fa4ac5a212f9f5e2", 0xd0, 0x4}, {&(0x7f00000004c0)="97b7be26fc7c93146764f0e1480fb8a1ce520cccba6747facb60bcff791d18855d7db472f62c1ab31fcfaf458f6f290b852ed3ebd7a5cff6e3348919d7d5c9929b5a6a8f34f1c4c08a31316b54f517e8825e3b2827946760eb418b0f0ff4ab5bbcd3b9b42f4ced800a4a0d5192a60cd356ac3d0a9e69a021c1ead0aff6eba4389b55f7f2df73784a0e7591713db7374614b20b255c7fcba507505c648fd478523a6ac35fa88ceabfc0fece542b1c44027001219d106b2c15bd7fcb7d40ff50b6262481e69018e972806c0b5e9e1270c11d3c6a8ed961b07fa89243d356a7410d416b7c3f8a5a4df96cdf1f3dbd37", 0xee, 0xc2}, {&(0x7f00000001c0)="8ea2f70d15a0438aca5b094be84b7c7e893be3a89ec48933aae3b41bd296d46137b7b35a415aad02b2bbd02dcf4d055e6841b4f331ecd6a8ed376296ac6c63c9d67c770d76aab38129d574e2f3", 0x4d, 0x95e}, {&(0x7f0000000080)="6b80ad6a37533b3c6e11883e78b7850bcea8c1e439e2f69a0aae80a3074fc235c742", 0x22, 0x7}], 0x101000, 0x0) 13:49:12 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:12 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x13, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x600000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:12 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10, 0x1) 13:49:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:12 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="28c63c7cb8"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x40000000000) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x80800) 13:49:12 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:12 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174d6", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:12 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7a000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6d00000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:12 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x9, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:12 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:12 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:12 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x9003) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xf000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:12 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() lchown(&(0x7f0000000040)='./file0\x00', r1, r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 473.869404] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 473.869404] ¾ ̈\‹©) failed (rc=-16) 13:49:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x8, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:13 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:13 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:13 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1782fcce5d747a3131995a00"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) 13:49:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x12, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x3f000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:13 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1f000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:13 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) msgget(0x1, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x26, 0x36, 0x16, 0x7, 0x3, 0x2, 0x0, 0x58, 0xffffffffffffffff}}) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:13 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x200000e6, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 474.492864] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 474.492864] ¾ ̈\‹©) failed (rc=1) 13:49:13 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617406", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:13 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:13 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x3, 0x581a82) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() capset(&(0x7f0000000400)={0x20071026, r2}, &(0x7f0000000440)={0x8, 0x3, 0x1000, 0x6, 0x1de5, 0x7f}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='9p\x00', 0x8000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none='cache=none'}]}}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000280)={0x6e09}) 13:49:13 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xa802) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000193, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:13 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x1fffffffffffff8, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000300)={r2}) r4 = memfd_create(&(0x7f0000000040)='ppp0#\x00', 0x2) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3001d1772a9432c220303b70b7072d7911b7e2982fcce5d747a3131a35a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) [ 474.698251] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 13:49:14 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x10, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:14 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:14 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x18000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:14 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4800000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:14 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x10}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:14 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) r1 = socket$inet(0x10, 0x7, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext, 0x280, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) accept4$nfc_llcp(r0, &(0x7f0000000380), &(0x7f0000000180)=0x60, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x27f, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16, 0x5}], 0x0, &(0x7f0000000400)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000200000093b8f972d14e34c2b56765fe8dee48ee367239903ae5abacde7a2c6f0aaba1b5f3897f11f13e5ab94775274413a4d2a818b531ec8b2b040212824f6ecaad7ed4315dbaf672e4fdf07a1aeaa8501fc8d1ea49e720822555a3624b761020d62875b828c33586c84751b5e83e8b78e31029b2daa3bb5b87c796d482fef94b4d5542580787c667cd511f543d2e8d2268c507a14b9c8df63eec2d7bdecde52a991dbda86ab66dca"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:14 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:14 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000d, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) socketpair$inet(0x2, 0x3, 0x401, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e24, @broadcast}, 0xfffffffffffffe8d) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x840, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000040)) [ 475.270423] FAT-fs (loop0): bogus number of FAT structure [ 475.276267] FAT-fs (loop0): Can't find a valid FAT filesystem 13:49:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0xe, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:14 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:14 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6800000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xe00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:14 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x1) 13:49:14 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:14 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x2000009b, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:14 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 13:49:14 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\a', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:14 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x775, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="0011b648a25492aac8f6dd4e71cf4ca61e000000b827867688867343e319a4989b9e24c529c798db4af225bb414cdd36f2c7dc4be015c8b1c62c1d27cd6a258ff356c22e4bcb2b871a4289981916c0165a16bb80495a5a1be7770c4add45e9285b0e820b20922ce34a681f2125cfb35fca91da26113d81bac8e309981d"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:14 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x48000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:14 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1900}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:15 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r1 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xfff, 0x600440) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f00000015c0)="c65edd2360f48c4f9aefb9d84ae5c346d0cd421abd0794b40f69945d3f35b026e440172aef40049655fce66607fafbbf257a48de2cb4bc5d2b40f09b77e19ede5d6b66de4598c330d74ab7c8653b0bb47b2a6fca45b5a7722d1dfa3a65deb7cf6a09fb1d8af6b95c91799f1782a01fdf2a13cc22798a621eefbb22118257e1b78cdb0f60964af1d5cc5920f8e24e17a1e921756cec1c55dc162d7c173feb380b3e08c73d153b4d", 0xa7) 13:49:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x3f9, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:15 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="7666617416", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:15 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x18, 0x7, 0x2, {{0xb, '/dev/mixer\x00'}, 0xfffffffffffffffc}}, 0x18) socket$inet(0x10, 0x7, 0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:15 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:15 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xf408000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x3f00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x11, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:15 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x8) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:15 executing program 6: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x4}}, 0x18) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:15 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:15 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xf4080000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:15 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0xb, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x19}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0xa, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:15 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000000)='GPL+mime_typevmnet0bdev#!eth1eth0\\}lo^\x00', 0x1) fsync(r1) mq_timedsend(r1, &(0x7f00000004c0)="99eb414d596d2b7ed77e8741957452d9cbb089d4bfd07b32fd3b5a31fe09263bc5baa611f465a8c5d669fefeb51a0aaf326290b4be82dec6807323678e456f52945d8e13c7035a59ff319e8df5349fb433cd6ce75811b24d1d07d6f8c820802c7a843479549bf23349449899461446f078d129fd2291ec21e1a72bbb236ddfe9806874c54f30b93432c905ce93d7926cc912daebd807907f1906f6763a0db2e517a6dccf66bd017b83ef85ddbcc964ff35fbded851d923b7293fa20123f484eb853e54d3c93092140548a2361a8ca3e02b06f338174e5368b8522022149be105680949659b54603acceb92f90c27b3bf82", 0xf1, 0x8, &(0x7f0000000040)={0x77359400}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:15 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:15 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x7, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:15 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:15 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x10) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7400000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:16 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0xc0a00) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x6, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:16 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:16 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:16 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:16 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x200, 0xfffffffffffffeff, 0x0, 0x5, 0xa, 0x8, "43d0252f9b4a9ba97f2cd4910a1b121204aa89e9fd04e66c12047c9cab9b45caea21c7c8102e84a97751157e50ec955c20b77f2365c0f82accda0397f3b6a3e1", "1f7556434c5caf4b646d7c2aa925dcadd4ea9f11e8448edcf6d35b8493f92443d42ff79b2e7116c8076cc77310192588440e57a6cd4592d36ed6773bdcaf6321", "db56014379125302f6bcbe91fb3ef18e8b5eed93e418da1dea82c46374b707ec", [0x8, 0x9]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) 13:49:16 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x5000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1800000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x20000178, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x73}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 477.486591] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 477.486591] ¾ ̈\‹©) failed (rc=1) 13:49:16 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:16 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:16 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001600)=[{&(0x7f0000000380)="434d12944ac10e120cc12e015e549e66bd87c1190dce40bfad4b9f3e9a034508ea5048571872b14f1aafa369f409addd3e56edb27c2b6ffb915cd4378f7a8adb22b8f707b29db18d51818ad6d9fc4b04517b2f72bb6e727c6a0eb6dc84aceb48ab39fe6b648f208df4f1e3b17639019dc0ab7c6f43c5f5cbc2fcccaf09c86c4c5a423153bf058afdcd2eb79bc1527eb80f4f6a31a3753e7e0d49650c84cc34f49ec5d484b207b79724e7223eb2b17f0f", 0xb0, 0x9}, {&(0x7f0000000440)="d4ab0407f1c9e7148b6db4026eb73024388d3f85c61233a8308058de8c6046f89ca6bb7407d872d6e31f84f55bc030efeb8e1f7147f2b87712f1c1d90d4d0427c49598bb4192d84426505b32fa586b2660459d6bfb3ffaa4c40c8761980b1cdb0946e4c99bc243d83cb5b2da7fa70651c7e0119936934eaa7299b238abb0bf363adff771f21998a45ccaff2c5873e978749718ebdf0abcfdc0f52a454159f5fc9f621952ebf7d9638783b1ea68325fd8488433b3b00a6f2f74967256f3ac55001817a6ec", 0xc4, 0xfffffffffffffff9}, {&(0x7f0000000540)="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", 0x1000, 0x80000000}, {&(0x7f0000000180)="b579548bde6b0e43e11cd7c8bf1a26c689830268fe15", 0x16, 0x71525eff}, {&(0x7f0000001540)="1b3c84b4f063dca32bef677036d6c9da5d10d15926b36ce4076ab3c445436bf13b6c8431c2d55011b6362e44ccf840c1e751a6b642f31e4f3f04700ea2a9fc6925b035a3aecf1ac1306caf89153eaabaa08f99707ced724d418016efff05b8d6204182613aba7c071c6efa9d96b88d7ffcd0160a07d5c2e00f1329c0ab0f8ff25e0fb7f23b82324b4a154f5be95fe7020ff35110ca915ebcbe35fdb87df46fc3", 0xa0, 0x10001}], 0x200000, &(0x7f0000000280)={[{@dots='dots'}, {@nodots='nodots'}]}) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x74}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:16 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)=@random={'osx.', 'lo#(\x00'}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000003c0)) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f00000001c0)=0x80) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x2080, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r2, r3}) 13:49:16 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2003) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x17000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 477.775991] FAT-fs (loop0): invalid media value (0x5e) [ 477.781593] FAT-fs (loop0): Can't find a valid FAT filesystem [ 477.862306] FAT-fs (loop0): invalid media value (0x5e) [ 477.867811] FAT-fs (loop0): Can't find a valid FAT filesystem 13:49:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl(r0, 0x3, &(0x7f0000000000)="0719d2dc3ff47fad5dbba4e7d2d526bce6385f186a1c2bb861654157be4fca8d9e792c825f915bc4b1b37c4a1aa29646a3d9e45fb9114a552b5044b6a90382c71fa6f5d141904eff973ae81102368ffbf2f1760ab0650f09715890fee89516771e73903574855db97f3ef17133ab11a925b68262f0b272bcef3fec002cdf1d5675fccda9e9d9d6e5db66dde294c6217a58f7850299fa46ca3081fab9e98264ef3bf672") ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:17 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174f5", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:17 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat&', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:17 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0xffff8000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x79}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:17 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) r1 = getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x75000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) [ 478.223944] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 478.223944] ¾ ̈\‹©) failed (rc=1) 13:49:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x6b}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:17 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:17 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:17 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000440)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x9, 0x80000001}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r1, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000180)=0x84) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000020000bc3e7e"], &(0x7f0000000140)=0xc) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x4e22, @rand_addr=0x3}], 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000040)={0x3, 0x0, [{0x40000001, 0x7, 0x1, 0x6, 0x8001, 0x7ff}, {0x6, 0x1ff, 0x5, 0x10001, 0x3, 0xfffffffffffffffa}, {0x6, 0x80, 0x2, 0x1f, 0xffff, 0xfffffffffffffff8, 0xff}]}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:17 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x14000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x1c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:17 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:17 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) 13:49:17 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617410", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:18 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4000000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x6d}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:18 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000040)=r1, 0x4) 13:49:18 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617405", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:18 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000003c0)={0x1, {{0x2, 0x4e23, @multicast1}}}, 0x88) setuid(r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a", [0x0, 0x1]}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000200)) 13:49:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1a000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:18 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xffffff87}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 479.035195] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 479.035195] ¾ ̈\‹©) failed (rc=1) 13:49:18 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:18 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:18 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) r1 = socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0xfffffffffffffd99}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) accept(r1, &(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x80) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:18 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x7400000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x54}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:18 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000001c0)) ioctl$void(r0, 0x5451) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) inotify_init1(0x800) r2 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x632, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000003c0)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0xfffffffffffff582, @dev={0xfe, 0x80, [], 0xf}, 0x3f}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e20, @broadcast}], 0x5c) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000000)) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) sync_file_range(r2, 0x9, 0x1f, 0x1) ioctl$RTC_AIE_OFF(r2, 0x7002) sysfs$3(0x3) sync() getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x7fff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000480)={r3, 0xee, "ab611e39a28b8ab9a633d57e4a1711394e3d8dfd9074912fa07f6272b5b2fd89f5a57407780c9968dd144c708a40312c6ea93c1492dd84badfdfa9f6276915ffcd9e8ac83f3db98039582c8f0c9382ad0dfbcb6e2141f381104cbb7ec97109f8d186c5d5059f2eb7c5903dca463a52493d0249a884d69477efbdc956023fb6b42d93bb287b927333d0042cb1de3a0d97b57b93fb34c896c8f3e6ae614911f51d715a67dfebe8860ec2f777528c7b2ca0155bf067e0e3d402ce33b646a6fee84524685bf9570e75180315059989ca27a18ea3f0a8b6751e0b98af28cadfe1d9010275efc284fdfd789b581ca5fdd6"}, &(0x7f0000000580)=0xf6) 13:49:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x66000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xffffffdc}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:18 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat&', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:18 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:18 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x200, 0x1) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000280)='gretap0\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000001c0)={@dev}, &(0x7f0000000200)=0x14) r3 = getpgid(0x0) r4 = getuid() r5 = getegid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000840)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000980)=0xe8) fstat(r1, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgid(0xffffffffffffffff) r10 = geteuid() r11 = getegid() sendmmsg$unix(r2, &(0x7f0000001c80)=[{&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000340)="0cc8c796515f9b12c33c8b43b830a7f9323f22effec8f9054ff822f6e585f933dd9fc5268e0a2b17d2", 0x29}, {&(0x7f00000003c0)="921953f0b56681bf7e8ca750ee9d7bdde745f0a0d67a2d04697515f61decab0cf2ce9e18c6a9d68993d147d23fce734c094c8a84cae621ecfb94818e3d83a10c4652ed5c47309d2a7b8ebf1d6b3b5dd7d39f4a3964d488d491c414ded05383d38513f33ceb49585f18f8f78b4435e5dbfdd5e95cc806734d77530a5b01586f198108645a130c12ecf8b7e55ea29c5623bebda3947b0a2675f9bde9e4bd1c3ca11a757221ecdcc1c15027df6d3761d89142a1c37afb0885e1013d111d", 0xbc}, {&(0x7f0000000480)="cf9b223d2194fc044ab048a002d616a6a8df1a73e8d49c2723904645dcc46de7a89351fd9ed168b34df9f405fa9bafa4a1c0452398da9e209c5521bd9c52c1448db2a32f3db28840712173338ad69939134a3da3650f6f7fd88bb74f126c26f43da995acd52e6a1cb57f4da7775e9ea2c34084e28b676ec9e88c3dc06503fbba60e680d951b736a9212f84b010158a724c38d439389bbd90419347ede927fc5623e4e69697c18bf14fb575a6200446b13658d65447aa83914740a43c6152849b445af401eaeff651d19aee06f6fa04b7cd8e251ab78c25f2edecedfb2dd5202699539b5915c03979e031bd8884", 0xed}, {&(0x7f0000000580)="804e935944fd4ce6544c24e67e56cf69deb118341e5ffd8e8c47567a230785f624055a3cfd3c7014c83b1e4ea17c403c72bf2c9d4bce0ced3157f63d2d6127db92683bb7bd885933744fb5deefeb0ef5a686bb394a68ea16b6332f05201ee796d2ad24a062adf7e42750c3e6bd4ca00ae824e6b4b0cdd87f023c28c207b5810820dc5d3319a4fe3b32e34cd1ad428a22da2d06f8b58a849aaeebd88a06ba6a52f4dd56cc05d28594d56e47bd8fdc27e7e02edf", 0xb3}, {&(0x7f0000000640)="2aee013e4fbf1fef3ed7c478340a29d7366d3cb9f5b92a8a9d3df1f2bd2926746c0e53591bda12ec", 0x28}], 0x5, &(0x7f0000000700), 0x0, 0x4000}, {&(0x7f0000000740)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000007c0)="e11276ffbcc31d687aad1899107efe6df3e6927a", 0x14}], 0x1, &(0x7f0000000a40)=[@rights={0x38, 0x1, 0x1, [r0, r2, r0, r1, r1, r1, r1, r2, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x30, 0x1, 0x1, [r0, r1, r1, r1, r2, r1, r1]}, @rights={0x20, 0x1, 0x1, [r2, r1, r0, r2]}], 0xe8, 0x10}, {&(0x7f0000000b40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000001bc0)="b25f7f7f079c3598b2b6f173709878433eea7d9ed8ae9a774700294448535aaafc30c7d6412777f2c137c0b5a7f3891c9413b432fcae9f806f1a7bca169ae6ad0bbac8e257484f657936651fd9b48c28a0fc3b9ed0ca5043561d93a3e8d82508718ed0fc3cb5c33eb0365a0dcdc6f8", 0x6f}], 0x2, 0x0, 0x0, 0x20000000}], 0x3, 0x10) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 13:49:18 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4c000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x4f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x12}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:18 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174e4", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:18 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:19 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:19 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000500)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x72}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:19 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) 13:49:19 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:19 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1f00) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x72}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:19 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x255}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) [ 480.188357] loop_reread_partitions: partition scan of loop0 (áÓøwåêäSå]}dÐ Iºí!÷Þ’¨f›8ÌÖ&WÛõ®F5Eiceµ€Zâ%º} [ 480.188357] ¾ ̈\‹©) failed (rc=1) 13:49:19 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:19 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000040a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:19 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x100, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) getrandom(&(0x7f0000000080)=""/35, 0x23, 0x0) socket$inet(0x10, 0x7, 0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000100)={'bridge_slave_1\x00'}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="000002000012da81ee208fd5df8cf2f1c8e3c034fc2b2018162ad0dfc6fe2ef51e8cfc25eb992db7cfb035a2089cc78400"], &(0x7f0000000140)=0xc) getgroups(0x8, &(0x7f0000000180)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0xee01]) setfsgid(r1) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xffffffa5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1c}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:19 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x390) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:19 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 480.699946] netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. 13:49:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x7d}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:19 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) [ 480.803440] netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. 13:49:19 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x1f, 0x8002, 0x101, 0x4, 0x1, 0x3ff, 0x1000, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={r1, 0x0, 0x2, [0x10000, 0xb893]}, &(0x7f0000000180)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:19 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:19 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x80ffff00000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:19 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1200000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:20 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xfffffff5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:20 executing program 6: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffff9c}, 0x10) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="8100000020000000339588a3b39c151a07ffb3fdd9fc596ee80c0187c39ec514aa20e5bdf338ff3119daaa9a7496507c475e55c8f4749de7946d91056762ab193c2c5b27f5ac193f4d999688125ec9a415e811127f9c77353aba940da99aa0709eaf130aa9e057442ccd70133c07"], &(0x7f00000001c0), 0x1000) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000007640)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000480)=""/26, 0x1a}, {&(0x7f00000004c0)=""/236, 0xec}, {&(0x7f00000005c0)=""/202, 0xca}, {&(0x7f00000006c0)=""/120, 0x78}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x5, &(0x7f00000017c0)=""/58, 0x3a, 0x2}, 0xff}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001800)=""/127, 0x7f}], 0x1, &(0x7f00000018c0)=""/100, 0x64, 0x9}, 0x200}, {{&(0x7f0000001940)=@nl=@unspec, 0x80, &(0x7f0000002e00)=[{&(0x7f00000019c0)=""/81, 0x51}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/218, 0xda}, {&(0x7f0000002b40)=""/205, 0xcd}, {&(0x7f0000002c40)=""/233, 0xe9}, {&(0x7f0000002d40)=""/157, 0x9d}], 0x6, &(0x7f0000002e80)=""/50, 0x32, 0x40}, 0x1}, {{&(0x7f0000002ec0)=@nl=@proc, 0x80, &(0x7f0000004040)=[{&(0x7f0000002f40)=""/147, 0x93}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000004000)=""/58, 0x3a}], 0x3, &(0x7f0000004080)=""/44, 0x2c, 0x1ff}, 0x800}, {{&(0x7f00000040c0)=@in6, 0x80, &(0x7f0000007400)=[{&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000006140)=""/112, 0x70}, {&(0x7f00000061c0)=""/148, 0x94}, {&(0x7f0000006280)=""/189, 0xbd}, {&(0x7f0000006340)=""/187, 0xbb}, {&(0x7f0000006400)=""/4096, 0x1000}], 0x7, &(0x7f0000007480)=""/118, 0x76, 0x3f}, 0xfffffffffffffff9}, {{&(0x7f0000007500)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000075c0)=[{&(0x7f0000007580)}], 0x1, &(0x7f0000007600)=""/48, 0x30, 0x20000000}}], 0x6, 0x40002001, &(0x7f00000077c0)={0x77359400}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000007800)={@loopback, @mcast1, @remote, 0xffffffff00000001, 0x81, 0x6, 0x100, 0x8, 0x81000000, r2}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000240)) 13:49:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:20 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:20 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x141000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000005c0), 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000006c0)=""/157) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x10}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = getpid() getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@local, 0x6a, 0x1, 0x0, 0x4, 0x400, 0x9, 0x3}, &(0x7f0000000280)=0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000480)={0x7, 0x70, 0x1, 0xff, 0x9, 0x7f, 0x0, 0x3, 0x400, 0xd, 0xff, 0x2, 0x800, 0xd2bd, 0x7ff, 0x2, 0x3, 0x80000000, 0x0, 0xffffffff, 0x6f5, 0x8, 0x7, 0x3ff, 0x10000, 0x3, 0x10000, 0x56, 0xaa6, 0x4, 0x2, 0x8, 0x0, 0x0, 0x4, 0x3, 0x9, 0x4bf5, 0x0, 0x7d36f7f5, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x400, 0x5, 0xfffffffffffffffa, 0x4, 0x3ff, 0x80000001, 0x4}, r4, 0xe, r1, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f00000008c0)={&(0x7f0000000800)={0x78, r5, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3141}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x1}, 0x880) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='+security\x00', r0}, 0x10) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000880)=0x3) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000680)={r2, 0x1, 0x6, @link_local}, 0x10) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:20 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:20 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x2000000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x45}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x23000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:20 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x4, 0x101000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) r2 = getgid() fchown(r0, r1, r2) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:20 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e70101c4cf144a23173b7605afb982fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000480)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000040)={0xff, @multicast1, 0x4e24, 0x0, 'lblc\x00', 0x300b55948c2c309d, 0xb, 0x62}, 0x2c) [ 481.528768] FAT-fs (loop0): bogus number of FAT structure [ 481.534582] FAT-fs (loop0): Can't find a valid FAT filesystem 13:49:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x2c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:20 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:20 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x70000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) [ 481.629684] FAT-fs (loop0): bogus number of FAT structure [ 481.635394] FAT-fs (loop0): Can't find a valid FAT filesystem 13:49:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1e00}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:20 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xffffffd5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:20 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) ioctl$int_in(r0, 0x5473, &(0x7f0000000040)=0x6) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:21 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:21 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) socket$inet_smc(0x2b, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x4000) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x4) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) 13:49:21 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x69}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:21 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4800) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1200}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0), 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r2) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:21 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:21 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)="76666174ff", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x4d}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:21 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e21, 0x2, @loopback, 0x8}}, 0x0, 0x7ff}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={r1, 0xff}, 0x8) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000240)) 13:49:21 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6c00) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1300}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:21 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) r1 = socket$inet(0x10, 0x7, 0x8) ioctl(r1, 0x80000001, &(0x7f0000000040)="6ddc0f03905b47dbcfd5efda0970242c22") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:21 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="7666617404", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x2d}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) 13:49:22 executing program 4: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x0, &(0x7f0000000180)}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x6) 13:49:22 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x400000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd, 0x9, "e1d3f877e5eae453e55d7d64d00d4901baed1b5ede92a8669b38ccd6260857dbf5ae46354569636517930f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@local, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) sendmsg$nl_xfrm(r1, &(0x7f0000000940)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000900)={&(0x7f0000000580)=@expire={0x370, 0x18, 0x200, 0x70bd29, 0x25dfdbfd, {{{@in=@multicast1, @in=@rand_addr=0xff, 0x4e21, 0x96f, 0x4e20, 0x1, 0x2, 0x20, 0x80, 0x88, r2, r3}, {@in6=@dev={0xfe, 0x80, [], 0x18}, 0x4d5, 0x3b}, @in, {0x7, 0x5, 0x0, 0x4, 0x400, 0x1, 0x4, 0x81}, {0xfff, 0xfffffffffffffffb, 0x1, 0x7}, {0x5, 0xfffffffffffffffb, 0x8bd}, 0x70bd2c, 0x3502, 0x2, 0x0, 0x7, 0xbe}, 0x9ffd}, [@proto={0x8, 0x19, 0x2b}, @ipv6_hthresh={0x8, 0x4, {0x2e, 0x27}}, @migrate={0x190, 0x11, [{@in=@rand_addr=0x1ff, @in6=@mcast1, 0x3c, 0x4, 0x0, 0x3506, 0x2, 0xa}, {@in6=@remote, @in6=@remote, 0x7e, 0x3, 0x0, 0x3506, 0x0, 0xa}, {@in6=@remote, @in=@multicast1, 0xff, 0x3, 0x0, 0x0, 0x2, 0xa}, {@in6=@ipv4={[], [], @loopback}, @in=@broadcast, 0x2b, 0x4, 0x0, 0x3505, 0x2, 0xa}, {@in6=@dev={0xfe, 0x80, [], 0x11}, @in=@multicast2, 0xff, 0x1, 0x0, 0x3502, 0xa}, {@in6=@mcast2, @in6=@local, 0x7c, 0x1, 0x0, 0x3507, 0x0, 0xa}, {@in6=@loopback, @in=@rand_addr=0x101, 0x32, 0x7, 0x0, 0x3505, 0xa, 0x2}, {@in6=@dev={0xfe, 0x80, [], 0x1f}, @in=@rand_addr=0x100, 0x2b, 0x3, 0x0, 0x3504, 0xa, 0x2}, {@in6=@remote, @in=@broadcast, 0x2b, 0x1, 0x0, 0x3501, 0xa, 0xa}]}, @algo_comp={0xc4, 0x3, {{'deflate\x00'}, 0x3e0, "63e386c84542758623b360e136ea701c45b64242d3f5feb10bd22aacafa00c28a99e9854b432e7a86fa32afa3331b5100a79220d3c2d0c8ea2a7f4a0ad0e1d9ae4a4f080334c8e00a2b955708a29ffab9890e75b5407aa2c3516077f4d225ab8a3c2eb719300dcfac5746d7be6774d2ca95d77dd0e8d49fef046ad27"}}, @coaddr={0x14, 0xe, @in=@broadcast}]}, 0x370}}, 0x10) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000240)) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) getdents(r4, &(0x7f00000001c0)=""/22, 0x16) ioctl$KVM_GET_DEVICE_ATTR(r4, 0x4018aee2, &(0x7f0000000080)={0x0, 0x2f, 0x0, &(0x7f0000000040)=0xfffffffffffffe01}) 13:49:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x67}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:22 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@xdp, &(0x7f0000000040)=0x80, 0x80800) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x0, 0xfff, 0x8, 0x3f}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:22 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x6600000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:22 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x6c00000000000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x3d}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:22 executing program 5: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000500)={0x15000, &(0x7f0000000180)}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)="76666174a7", &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:22 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffb, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x0, 0x2, [0x0, 0xb893]}, &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000380)=""/69, &(0x7f0000000040)=0x45) 13:49:22 executing program 7: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x4000000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) 13:49:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x7200000000000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080), 0xc) close(r1) 13:49:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xffffffb5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:22 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) socket$inet(0x10, 0x7, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0xe000, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="b800000000000000"], &(0x7f0000000140)=0xc) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 13:49:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x200000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0xffffffb7}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x256, &(0x7f0000000040)=""/251}, 0x48) 13:49:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25={0x3, {}}, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) prctl$intptr(0x29, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8c9) clone(0x0, &(0x7f0000000480), &(0x7f0000000080), &(0x7f0000001000), &(0x7f0000000200)) [ 719.167624] INFO: task syz-executor4:2494 blocked for more than 140 seconds. [ 719.175013] Not tainted 4.18.0+ #190 [ 719.179324] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 719.187510] syz-executor4 D24576 2494 4498 0x00000004 [ 719.193258] Call Trace: [ 719.195954] __schedule+0x87c/0x1ec0 [ 719.199743] ? __sched_text_start+0x8/0x8 [ 719.203973] ? graph_lock+0x170/0x170 [ 719.207844] ? graph_lock+0x170/0x170 [ 719.211806] ? graph_lock+0x170/0x170 [ 719.215674] ? kasan_check_read+0x11/0x20 [ 719.220002] ? rcu_is_watching+0x8c/0x150 [ 719.224251] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 719.228992] ? find_held_lock+0x36/0x1c0 [ 719.233126] schedule+0xfb/0x450 [ 719.236592] ? __schedule+0x1ec0/0x1ec0 [ 719.240669] ? kasan_check_read+0x11/0x20 [ 719.244884] ? do_raw_spin_unlock+0xa7/0x2f0 [ 719.249364] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 719.254015] ? debug_mutex_free_waiter+0x1c0/0x1c0 [ 719.259017] ? mutex_destroy+0x200/0x200 [ 719.263210] ? do_raw_spin_lock+0xc1/0x200 [ 719.267521] schedule_preempt_disabled+0x10/0x20 [ 719.272383] __mutex_lock+0xee2/0x18a0 [ 719.276354] ? trace_hardirqs_on+0xd/0x10 [ 719.280593] ? blkdev_put+0x34/0x540 [ 719.284384] ? mutex_trylock+0x2b0/0x2b0 [ 719.288529] ? send_sigio+0x340/0x340 [ 719.292420] ? graph_lock+0x170/0x170 [ 719.296320] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 719.300979] ? kasan_check_write+0x14/0x20 [ 719.305322] ? find_held_lock+0x36/0x1c0 [ 719.309471] ? lock_downgrade+0x8f0/0x8f0 [ 719.313742] ? fsnotify_flush_notify+0xe0/0xe0 [ 719.318420] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.324033] ? fsnotify_first_mark+0x1c5/0x350 [ 719.328719] ? __lock_is_held+0xb5/0x140 [ 719.332853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.338532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.344134] ? locks_remove_file+0x402/0x5c0 [ 719.348669] ? fcntl_setlk+0x1040/0x1040 [ 719.352821] ? fsnotify_first_mark+0x350/0x350 [ 719.357502] ? __fsnotify_parent+0xcc/0x420 [ 719.361921] ? blkdev_put+0x540/0x540 [ 719.365809] mutex_lock_nested+0x16/0x20 [ 719.369941] ? mutex_lock_nested+0x16/0x20 [ 719.374270] blkdev_put+0x34/0x540 [ 719.377883] ? blkdev_put+0x540/0x540 [ 719.381767] blkdev_close+0x8b/0xb0 [ 719.385486] __fput+0x39b/0x860 [ 719.388889] ? file_free_rcu+0x90/0x90 [ 719.392871] ? _raw_spin_unlock_irq+0x27/0x70 [ 719.397569] ____fput+0x15/0x20 [ 719.400941] task_work_run+0x1e8/0x2a0 [ 719.404906] ? task_work_cancel+0x240/0x240 [ 719.409314] ? exit_to_usermode_loop+0x8c/0x380 [ 719.414063] exit_to_usermode_loop+0x318/0x380 [ 719.418742] ? syscall_slow_exit_work+0x500/0x500 [ 719.423664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.429306] do_syscall_64+0x6be/0x820 [ 719.433268] ? syscall_slow_exit_work+0x500/0x500 [ 719.438231] ? syscall_return_slowpath+0x5e0/0x5e0 [ 719.443257] ? syscall_return_slowpath+0x31d/0x5e0 [ 719.448278] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.453718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.458649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.463919] RIP: 0033:0x410c41 [ 719.467230] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 719.486322] RSP: 002b:00007ffcf11ecf60 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 719.494262] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000410c41 [ 719.501598] RDX: 0000000000000000 RSI: 0000000000730380 RDI: 0000000000000004 [ 719.508957] RBP: 0000000000000000 R08: ffffffffffffffff R09: ffffffffffffffff [ 719.516294] R10: 00007ffcf11ece90 R11: 0000000000000293 R12: 0000000000000003 [ 719.523663] R13: 0000000000075c47 R14: 00000000000001da R15: badc0ffeebadface [ 719.531039] INFO: task syz-executor4:2515 blocked for more than 140 seconds. [ 719.538305] Not tainted 4.18.0+ #190 [ 719.542596] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 719.550742] syz-executor4 D24280 2515 4498 0x00000004 [ 719.556494] Call Trace: [ 719.559210] __schedule+0x87c/0x1ec0 [ 719.562996] ? __sched_text_start+0x8/0x8 [ 719.567260] ? print_usage_bug+0xc0/0xc0 [ 719.571399] ? graph_lock+0x170/0x170 [ 719.575289] ? graph_lock+0x170/0x170 [ 719.579199] ? __lock_acquire+0x7fc/0x5020 [ 719.583533] ? find_held_lock+0x36/0x1c0 [ 719.587672] schedule+0xfb/0x450 [ 719.591130] ? __schedule+0x1ec0/0x1ec0 [ 719.595246] ? kasan_check_read+0x11/0x20 [ 719.599549] ? do_raw_spin_unlock+0xa7/0x2f0 [ 719.604029] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 719.608692] ? debug_mutex_free_waiter+0x1c0/0x1c0 [ 719.613797] ? mutex_destroy+0x200/0x200 [ 719.617937] ? do_raw_spin_lock+0xc1/0x200 [ 719.622266] schedule_preempt_disabled+0x10/0x20 [ 719.627109] __mutex_lock+0xee2/0x18a0 [ 719.631104] ? find_held_lock+0x36/0x1c0 [ 719.635441] ? __blkdev_get+0x19b/0x13c0 [ 719.639585] ? mutex_trylock+0x2b0/0x2b0 [ 719.643734] ? lock_downgrade+0x8f0/0x8f0 [ 719.647962] ? graph_lock+0x170/0x170 [ 719.651850] ? __lock_acquire+0x7fc/0x5020 [ 719.656207] ? graph_lock+0x170/0x170 [ 719.660099] ? kasan_check_write+0x14/0x20 [ 719.664528] ? lock_acquire+0x1e4/0x540 [ 719.668611] ? get_gendisk+0x78/0x380 [ 719.672514] ? find_held_lock+0x36/0x1c0 [ 719.676664] ? lock_downgrade+0x8f0/0x8f0 [ 719.680886] ? down_read+0xb5/0x1d0 [ 719.684606] ? __down_interruptible+0x700/0x700 [ 719.689352] ? kobj_lookup+0x36a/0x460 [ 719.693333] mutex_lock_nested+0x16/0x20 [ 719.697465] ? mutex_lock_nested+0x16/0x20 [ 719.701815] __blkdev_get+0x19b/0x13c0 [ 719.705893] ? blkdev_get_block+0xc0/0xc0 [ 719.710121] blkdev_get+0xc1/0xb50 [ 719.713790] ? bdget+0x5e0/0x5e0 [ 719.717252] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 719.721916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.727518] ? errseq_sample+0xe5/0x130 [ 719.731581] ? _copy_to_user+0x110/0x110 [ 719.735719] ? _raw_spin_unlock+0x22/0x30 [ 719.739955] blkdev_open+0x1fb/0x280 [ 719.743740] do_dentry_open+0x4d5/0x1190 [ 719.747887] ? bd_acquire+0x2c0/0x2c0 [ 719.751763] ? chown_common+0x730/0x730 [ 719.755831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.761575] ? security_inode_permission+0xd2/0x100 [ 719.766676] ? inode_permission+0xb2/0x560 [ 719.770989] vfs_open+0x12f/0x220 [ 719.774698] path_openat+0x1076/0x4c90 [ 719.778825] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 719.783606] ? path_lookupat.isra.45+0xc00/0xc00 [ 719.788453] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 719.793566] ? expand_files.part.8+0x571/0x9c0 [ 719.798253] ? find_held_lock+0x36/0x1c0 [ 719.802403] ? lock_downgrade+0x8f0/0x8f0 [ 719.806618] ? do_sys_open+0x3a2/0x760 [ 719.810594] ? kasan_check_read+0x11/0x20 [ 719.814848] ? do_raw_spin_unlock+0xa7/0x2f0 [ 719.819335] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 719.823992] ? __lock_is_held+0xb5/0x140 [ 719.828182] ? _raw_spin_unlock+0x22/0x30 [ 719.832402] ? __alloc_fd+0x34e/0x710 [ 719.836281] ? usercopy_warn+0x120/0x120 [ 719.840423] do_filp_open+0x255/0x380 [ 719.844314] ? may_open_dev+0x100/0x100 [ 719.848359] ? strncpy_from_user+0x3be/0x510 [ 719.852876] ? mpi_free.cold.1+0x19/0x19 [ 719.857092] ? get_unused_fd_flags+0x122/0x1a0 [ 719.861764] ? getname_flags+0x26e/0x5a0 [ 719.865894] ? __sb_end_write+0xac/0xe0 [ 719.869955] do_sys_open+0x584/0x760 [ 719.873743] ? filp_open+0x80/0x80 [ 719.877371] ? do_sys_ftruncate+0x44e/0x560 [ 719.881774] __x64_sys_open+0x7e/0xc0 [ 719.885663] do_syscall_64+0x1b9/0x820 [ 719.889634] ? finish_task_switch+0x1d3/0x870 [ 719.894251] ? syscall_return_slowpath+0x5e0/0x5e0 [ 719.899260] ? syscall_return_slowpath+0x31d/0x5e0 [ 719.904285] ? __switch_to_asm+0x34/0x70 [ 719.908421] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 719.913880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.918801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.924064] RIP: 0033:0x410dc1 [ 719.927415] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 719.946539] RSP: 002b:00007fd56c699a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 719.954329] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 0000000000410dc1 [ 719.961685] RDX: 00007fd56c699afa RSI: 0000000000000002 RDI: 00007fd56c699af0 [ 719.969024] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 719.976469] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 719.983824] R13: 0000000000000001 R14: 00000000004c9d2d R15: 0000000000000001 [ 719.991221] INFO: task syz-executor6:2511 blocked for more than 140 seconds. [ 719.998556] Not tainted 4.18.0+ #190 [ 720.002856] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 720.011199] syz-executor6 D24568 2511 4500 0x00000004 [ 720.016915] Call Trace: [ 720.019570] __schedule+0x87c/0x1ec0 [ 720.023375] ? __sched_text_start+0x8/0x8 [ 720.027592] ? print_usage_bug+0xc0/0xc0 [ 720.031740] ? graph_lock+0x170/0x170 [ 720.035621] ? trace_hardirqs_on+0x10/0x10 [ 720.039939] ? graph_lock+0x170/0x170 [ 720.043827] schedule+0xfb/0x450 [ 720.047282] ? lock_downgrade+0x8f0/0x8f0 [ 720.051510] ? __schedule+0x1ec0/0x1ec0 [ 720.056175] ? mark_held_locks+0xc9/0x160 [ 720.060403] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 720.065072] ? _raw_spin_unlock_irq+0x27/0x70 [ 720.069644] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 720.074758] rwsem_down_read_failed+0x362/0x610 [ 720.079521] ? rt_mutex_futex_unlock+0x130/0x130 [ 720.084373] ? lock_acquire+0x1e4/0x540 [ 720.088525] ? __get_super.part.12+0x20f/0x2e0 [ 720.093232] call_rwsem_down_read_failed+0x18/0x30 [ 720.098262] down_read+0xc3/0x1d0 [ 720.101805] ? __get_super.part.12+0x20f/0x2e0 [ 720.106467] ? __down_interruptible+0x700/0x700 [ 720.111254] ? do_raw_spin_unlock+0xa7/0x2f0 [ 720.115769] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 720.120423] ? lock_release+0xa30/0xa30 [ 720.124509] ? kasan_check_read+0x11/0x20 [ 720.128747] ? bd_may_claim+0xd0/0xd0 [ 720.132645] __get_super.part.12+0x20f/0x2e0 [ 720.137176] get_super+0x2d/0x50 [ 720.140634] fsync_bdev+0x17/0xc0 [ 720.144194] invalidate_partition+0x35/0x60 [ 720.148601] drop_partitions.isra.13+0xe8/0x200 [ 720.153345] ? delete_partition+0x2c0/0x2c0 [ 720.157754] ? mark_held_locks+0xc9/0x160 [ 720.162064] rescan_partitions+0x75/0x910 [ 720.166317] __blkdev_reread_part+0x1ad/0x230 [ 720.170963] blkdev_reread_part+0x26/0x40 [ 720.175348] loop_reread_partitions+0x163/0x190 [ 720.180093] ? __loop_update_dio+0x6a0/0x6a0 [ 720.184591] loop_set_status+0xb95/0x1010 [ 720.188823] loop_set_status64+0xaa/0x100 [ 720.193049] ? loop_set_status_old+0x920/0x920 [ 720.197703] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 720.202649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.208257] ? ns_capable_common+0x13f/0x170 [ 720.212754] lo_ioctl+0x90e/0x1d90 [ 720.216370] ? find_held_lock+0x36/0x1c0 [ 720.220541] ? lo_rw_aio_complete+0x450/0x450 [ 720.225250] blkdev_ioctl+0x9cd/0x2030 [ 720.229248] ? blkpg_ioctl+0xc40/0xc40 [ 720.233253] ? kasan_check_read+0x11/0x20 [ 720.237595] ? rcu_is_watching+0x8c/0x150 [ 720.241815] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 720.246566] ? __fget+0x4d5/0x740 [ 720.250093] ? ksys_dup3+0x690/0x690 [ 720.254020] ? __sched_text_start+0x8/0x8 [ 720.258256] ? kasan_check_write+0x14/0x20 [ 720.262581] ? do_raw_spin_lock+0xc1/0x200 [ 720.266894] block_ioctl+0xee/0x130 [ 720.270627] ? blkdev_fallocate+0x400/0x400 [ 720.275029] do_vfs_ioctl+0x1de/0x1720 [ 720.279035] ? rcu_is_watching+0x8c/0x150 [ 720.283308] ? ioctl_preallocate+0x300/0x300 [ 720.287944] ? __fget_light+0x2f7/0x440 [ 720.291988] ? fget_raw+0x20/0x20 [ 720.295528] ? schedule+0xfb/0x450 [ 720.299184] ? __x64_sys_futex+0x47f/0x6a0 [ 720.303526] ? do_futex+0x27d0/0x27d0 [ 720.307396] ? security_file_ioctl+0x94/0xc0 [ 720.311895] ksys_ioctl+0xa9/0xd0 [ 720.315424] __x64_sys_ioctl+0x73/0xb0 [ 720.319406] do_syscall_64+0x1b9/0x820 [ 720.323367] ? syscall_slow_exit_work+0x500/0x500 [ 720.328300] ? syscall_return_slowpath+0x5e0/0x5e0 [ 720.333415] ? syscall_return_slowpath+0x31d/0x5e0 [ 720.338438] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 720.343883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.348811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.354070] RIP: 0033:0x457089 [ 720.357351] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.376319] RSP: 002b:00007f2131bb9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 720.384109] RAX: ffffffffffffffda RBX: 00007f2131bba6d4 RCX: 0000000000457089 [ 720.391497] RDX: 00000000200000c0 RSI: 0000000000004c04 RDI: 0000000000000003 [ 720.398950] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 720.406402] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 720.413749] R13: 00000000004cf300 R14: 00000000004c5908 R15: 0000000000000000 [ 720.421262] INFO: task syz-executor6:2526 blocked for more than 140 seconds. [ 720.428517] Not tainted 4.18.0+ #190 [ 720.432932] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 720.440981] syz-executor6 D24280 2526 4500 0x00000004 [ 720.446678] Call Trace: [ 720.449354] __schedule+0x87c/0x1ec0 [ 720.453175] ? __sched_text_start+0x8/0x8 [ 720.457415] ? update_load_avg+0x27d0/0x27d0 [ 720.461896] ? print_usage_bug+0xc0/0xc0 [ 720.466040] ? graph_lock+0x170/0x170 [ 720.469923] ? graph_lock+0x170/0x170 [ 720.473810] ? __lock_acquire+0x7fc/0x5020 [ 720.478121] ? find_held_lock+0x36/0x1c0 [ 720.482297] schedule+0xfb/0x450 [ 720.485746] ? __schedule+0x1ec0/0x1ec0 [ 720.489809] ? kasan_check_read+0x11/0x20 [ 720.494025] ? do_raw_spin_unlock+0xa7/0x2f0 [ 720.498530] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 720.503237] ? debug_mutex_free_waiter+0x1c0/0x1c0 [ 720.508272] ? mutex_destroy+0x200/0x200 [ 720.512407] ? do_raw_spin_lock+0xc1/0x200 [ 720.516734] schedule_preempt_disabled+0x10/0x20 [ 720.521559] __mutex_lock+0xee2/0x18a0 [ 720.525525] ? find_held_lock+0x36/0x1c0 [ 720.529669] ? __blkdev_get+0x19b/0x13c0 [ 720.533957] ? mutex_trylock+0x2b0/0x2b0 [ 720.538089] ? lock_downgrade+0x8f0/0x8f0 [ 720.542330] ? graph_lock+0x170/0x170 [ 720.546232] ? __lock_acquire+0x7fc/0x5020 [ 720.550562] ? graph_lock+0x170/0x170 [ 720.554445] ? kasan_check_write+0x14/0x20 [ 720.558763] ? lock_acquire+0x1e4/0x540 [ 720.562821] ? get_gendisk+0x78/0x380 [ 720.566710] ? find_held_lock+0x36/0x1c0 [ 720.570938] ? lock_downgrade+0x8f0/0x8f0 [ 720.575216] ? down_read+0xb5/0x1d0 [ 720.578914] ? __down_interruptible+0x700/0x700 [ 720.583679] ? kobj_lookup+0x36a/0x460 [ 720.587670] mutex_lock_nested+0x16/0x20 [ 720.591814] ? mutex_lock_nested+0x16/0x20 [ 720.596121] __blkdev_get+0x19b/0x13c0 [ 720.600132] ? blkdev_get_block+0xc0/0xc0 [ 720.604396] blkdev_get+0xc1/0xb50 [ 720.608036] ? bdget+0x5e0/0x5e0 [ 720.611478] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 720.616205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.621917] ? errseq_sample+0xe5/0x130 [ 720.625955] ? _copy_to_user+0x110/0x110 [ 720.630099] ? _raw_spin_unlock+0x22/0x30 [ 720.634359] blkdev_open+0x1fb/0x280 [ 720.638275] do_dentry_open+0x4d5/0x1190 [ 720.642411] ? bd_acquire+0x2c0/0x2c0 [ 720.646296] ? chown_common+0x730/0x730 [ 720.650351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.655977] ? security_inode_permission+0xd2/0x100 [ 720.661066] ? inode_permission+0xb2/0x560 [ 720.665387] vfs_open+0x12f/0x220 [ 720.668915] path_openat+0x1076/0x4c90 [ 720.672893] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 720.677646] ? path_lookupat.isra.45+0xc00/0xc00 [ 720.682511] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 720.687596] ? expand_files.part.8+0x571/0x9c0 [ 720.692277] ? find_held_lock+0x36/0x1c0 [ 720.696602] ? lock_downgrade+0x8f0/0x8f0 [ 720.700833] ? do_sys_open+0x3a2/0x760 [ 720.704795] ? kasan_check_read+0x11/0x20 [ 720.709108] ? do_raw_spin_unlock+0xa7/0x2f0 [ 720.713623] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 720.718320] ? __lock_is_held+0xb5/0x140 [ 720.722473] ? _raw_spin_unlock+0x22/0x30 [ 720.726723] ? __alloc_fd+0x34e/0x710 [ 720.730601] ? usercopy_warn+0x120/0x120 [ 720.734741] do_filp_open+0x255/0x380 [ 720.738648] ? may_open_dev+0x100/0x100 [ 720.742697] ? strncpy_from_user+0x3be/0x510 [ 720.747234] ? mpi_free.cold.1+0x19/0x19 [ 720.751371] ? get_unused_fd_flags+0x122/0x1a0 [ 720.756119] ? getname_flags+0x26e/0x5a0 [ 720.760290] do_sys_open+0x584/0x760 [ 720.764082] ? do_futex+0x27a4/0x27d0 [ 720.767950] ? filp_open+0x80/0x80 [ 720.771574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.777218] ? ksys_ioctl+0x81/0xd0 [ 720.780935] __x64_sys_open+0x7e/0xc0 [ 720.784810] do_syscall_64+0x1b9/0x820 [ 720.788786] ? syscall_return_slowpath+0x5e0/0x5e0 [ 720.793789] ? syscall_return_slowpath+0x31d/0x5e0 [ 720.798815] ? __switch_to_asm+0x34/0x70 [ 720.802949] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 720.808401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.813323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.818713] RIP: 0033:0x410dc1 [ 720.821976] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 720.841055] RSP: 002b:00007f2131b777a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 720.848848] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000410dc1 [ 720.856235] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f2131b77850 [ 720.863570] RBP: 00000000009301e0 R08: 000000000000000f R09: 0000000000000000 [ 720.870914] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 720.878252] R13: 00000000004d68a8 R14: 00000000004c9e86 R15: 0000000000000002 [ 720.885614] [ 720.885614] Showing all locks held in the system: [ 720.892001] 1 lock held by khungtaskd/776: [ 720.896304] #0: 00000000c8fe1416 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x428 [ 720.905007] 1 lock held by rsyslogd/4359: [ 720.909265] 2 locks held by getty/4449: [ 720.913454] #0: 00000000250d9473 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 720.921915] #1: 000000002d21d17e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 720.930860] 2 locks held by getty/4450: [ 720.934912] #0: 000000001057adcf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 720.943250] #1: 0000000005ef7f62 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 720.952243] 2 locks held by getty/4451: [ 720.956277] #0: 0000000039ad561e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 720.964615] #1: 00000000957de675 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 720.973553] 2 locks held by getty/4452: [ 720.977593] #0: 00000000ee86fade (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 720.986065] #1: 00000000681b9130 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 720.995061] 2 locks held by getty/4453: [ 720.999090] #0: 00000000d6f30578 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 721.007515] #1: 0000000045efd6bc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 721.016463] 2 locks held by getty/4454: [ 721.020536] #0: 00000000304d74c6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 721.028876] #1: 00000000609983dc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 721.037827] 2 locks held by getty/4455: [ 721.041869] #0: 00000000eff5284a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 721.050232] #1: 00000000a1208cd4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 721.059244] 2 locks held by kworker/0:4/18289: [ 721.063888] #0: 0000000098be4e88 ((wq_completion)"events"){+.+.}, at: process_one_work+0xb44/0x1ba0 [ 721.073290] #1: 00000000b831643f ((work_completion)(&smc->tcp_listen_work)){+.+.}, at: process_one_work+0xb9b/0x1ba0 [ 721.084186] 1 lock held by syz-executor4/2494: [ 721.088845] #0: 00000000eaa2bf55 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x34/0x540 [ 721.096835] 1 lock held by syz-executor4/2499: [ 721.101508] 1 lock held by syz-executor4/2515: [ 721.106173] #0: 00000000eaa2bf55 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 721.114524] 3 locks held by syz-executor6/2511: [ 721.119248] #0: 000000005ff91d81 (&lo->lo_ctl_mutex/1){+.+.}, at: lo_ioctl+0x8e/0x1d90 [ 721.127511] #1: 00000000eaa2bf55 (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 721.136117] #2: 0000000040955e63 (&type->s_umount_key#46){++++}, at: __get_super.part.12+0x20f/0x2e0 [ 721.145644] 1 lock held by syz-executor6/2526: [ 721.150294] #0: 00000000eaa2bf55 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 721.158631] [ 721.160321] ============================================= [ 721.160321] [ 721.167951] NMI backtrace for cpu 0 [ 721.171653] CPU: 0 PID: 776 Comm: khungtaskd Not tainted 4.18.0+ #190 [ 721.178268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.187638] Call Trace: [ 721.190257] dump_stack+0x1c9/0x2b4 [ 721.193913] ? dump_stack_print_info.cold.2+0x52/0x52 [ 721.199128] ? vprintk_default+0x28/0x30 [ 721.203252] nmi_cpu_backtrace.cold.4+0x19/0xce [ 721.207955] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 721.212823] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 721.218038] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 721.223344] arch_trigger_cpumask_backtrace+0x14/0x20 [ 721.228665] watchdog+0x9c4/0xf80 [ 721.232188] ? reset_hung_task_detector+0xd0/0xd0 [ 721.237061] ? kasan_check_read+0x11/0x20 [ 721.241232] ? do_raw_spin_unlock+0xa7/0x2f0 [ 721.245846] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 721.250970] ? __kthread_parkme+0x58/0x1b0 [ 721.255227] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.260266] ? trace_hardirqs_on+0xd/0x10 [ 721.264439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.269997] ? __kthread_parkme+0x106/0x1b0 [ 721.274343] kthread+0x35a/0x420 [ 721.277736] ? reset_hung_task_detector+0xd0/0xd0 [ 721.282601] ? kthread_bind+0x40/0x40 [ 721.286423] ret_from_fork+0x3a/0x50 [ 721.290270] Sending NMI from CPU 0 to CPUs 1: [ 721.294839] NMI backtrace for cpu 1 [ 721.294851] CPU: 1 PID: 2293 Comm: udevd Not tainted 4.18.0+ #190 [ 721.294857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.294870] RIP: 0010:write_comp_data+0x1/0x70 [ 721.294881] Code: ff ff 48 8b bd d0 fe ff ff e8 3b 3f 3e 00 e9 ad fc ff ff 4c 89 ef e8 8e 3e 3e 00 e9 76 fc ff ff e8 04 9b ca ff 90 90 90 90 55 <65> 4c 8b 04 25 40 ee 01 00 65 8b 05 1f 1e 85 7e 48 89 e5 a9 00 01 [ 721.294887] RSP: 0018:ffff8801ca497340 EFLAGS: 00000246 [ 721.294896] RAX: 0000000000000001 RBX: ffff8801ca755918 RCX: ffffffff81db6621 [ 721.294902] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000005 [ 721.294909] RBP: ffff8801ca497350 R08: ffff8801ca48a000 R09: ffffed00399bcc7f [ 721.294915] R10: ffffed00399bcc7f R11: ffff8801ccde63ff R12: dffffc0000000000 [ 721.294921] R13: ffff8801ca497630 R14: 0000000000000000 R15: 0000000000000001 [ 721.294930] FS: 00007f9505d227a0(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 721.294937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 721.294943] CR2: 00000000016a7978 CR3: 00000001caa7d000 CR4: 00000000001406e0 [ 721.294950] Call Trace: [ 721.294964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.294976] ep_send_events_proc+0xbb1/0xf00 [ 721.294990] ? do_epoll_wait+0x200/0x200 [ 721.295005] ? print_usage_bug+0xc0/0xc0 [ 721.295017] ? lock_downgrade+0x8f0/0x8f0 [ 721.295029] ? mark_held_locks+0xc9/0x160 [ 721.295040] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 721.295053] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 721.295063] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.295074] ? do_epoll_wait+0x200/0x200 [ 721.295086] ep_scan_ready_list+0x3c5/0xf50 [ 721.295095] ? lock_downgrade+0x8f0/0x8f0 [ 721.295108] ? ep_poll_callback+0x10f0/0x10f0 [ 721.295122] ? pvclock_read_flags+0x160/0x160 [ 721.295133] ? graph_lock+0x170/0x170 [ 721.295177] ? ktime_get_ts64+0x419/0x530 [ 721.295191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.295202] ? ktime_get_ts64+0x3a5/0x530 [ 721.295215] ? find_held_lock+0x36/0x1c0 [ 721.295227] ? lock_downgrade+0x8f0/0x8f0 [ 721.295238] ? kasan_check_read+0x11/0x20 [ 721.295248] ? do_raw_spin_unlock+0xa7/0x2f0 [ 721.295258] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 721.295271] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 721.295281] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.295293] ep_poll+0x3ef/0x1220 [ 721.295304] ? preempt_notifier_register+0x200/0x200 [ 721.295313] ? __switch_to_asm+0x34/0x70 [ 721.295326] ? do_epoll_create+0x5c0/0x5c0 [ 721.295334] ? __switch_to_asm+0x40/0x70 [ 721.295343] ? __switch_to_asm+0x40/0x70 [ 721.295354] ? __schedule+0x884/0x1ec0 [ 721.295362] ? __switch_to_asm+0x40/0x70 [ 721.295370] ? __switch_to_asm+0x34/0x70 [ 721.295382] ? __sched_text_start+0x8/0x8 [ 721.295391] ? retint_kernel+0x10/0x10 [ 721.295404] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 721.295415] ? retint_kernel+0x10/0x10 [ 721.295426] ? __fget_light+0x155/0x440 [ 721.295440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.295449] ? __fget_light+0x2f7/0x440 [ 721.295464] ? fget_raw+0x20/0x20 [ 721.295475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 721.295485] ? retint_kernel+0x10/0x10 [ 721.295499] ? exit_to_usermode_loop+0x8c/0x380 [ 721.295514] do_epoll_wait+0x1b0/0x200 [ 721.295527] __x64_sys_epoll_wait+0x97/0xf0 [ 721.295538] do_syscall_64+0x1b9/0x820 [ 721.295549] ? syscall_slow_exit_work+0x500/0x500 [ 721.295561] ? syscall_return_slowpath+0x5e0/0x5e0 [ 721.295572] ? syscall_return_slowpath+0x31d/0x5e0 [ 721.295583] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 721.295596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.295607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.295615] RIP: 0033:0x7f9505436943 [ 721.295625] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 721.295630] RSP: 002b:00007ffe1456a0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 721.295640] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007f9505436943 [ 721.295646] RDX: 0000000000000008 RSI: 00007ffe1456a1e0 RDI: 000000000000000a [ 721.295652] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 721.295665] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 721.295672] R13: 0000000000000000 R14: 000000000203bcb0 R15: 000000000202e250 [ 721.295842] Kernel panic - not syncing: hung_task: blocked tasks [ 721.715699] CPU: 0 PID: 776 Comm: khungtaskd Not tainted 4.18.0+ #190 [ 721.722468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.731838] Call Trace: [ 721.734467] dump_stack+0x1c9/0x2b4 [ 721.738126] ? dump_stack_print_info.cold.2+0x52/0x52 [ 721.743460] ? printk_safe_log_store+0x2f0/0x2f0 [ 721.748252] panic+0x238/0x4e7 [ 721.751468] ? add_taint.cold.5+0x16/0x16 [ 721.755648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.761218] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 721.766693] ? printk_safe_flush+0xd7/0x130 [ 721.771043] watchdog+0x9d5/0xf80 [ 721.774531] ? reset_hung_task_detector+0xd0/0xd0 [ 721.779404] ? kasan_check_read+0x11/0x20 [ 721.783582] ? do_raw_spin_unlock+0xa7/0x2f0 [ 721.788023] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 721.793179] ? __kthread_parkme+0x58/0x1b0 [ 721.797442] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.802483] ? trace_hardirqs_on+0xd/0x10 [ 721.806658] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.812220] ? __kthread_parkme+0x106/0x1b0 [ 721.816572] kthread+0x35a/0x420 [ 721.819976] ? reset_hung_task_detector+0xd0/0xd0 [ 721.824835] ? kthread_bind+0x40/0x40 [ 721.828658] ret_from_fork+0x3a/0x50 [ 721.832756] Dumping ftrace buffer: [ 721.836437] (ftrace buffer empty) [ 721.840170] Kernel Offset: disabled [ 721.843800] Rebooting in 86400 seconds..