bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80, 0x80800) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000240)=0x1004, 0x4) statx(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0x1000, 0x4a0, &(0x7f0000000980)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x0, &(0x7f0000000280)="153f623448") r3 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000040)=0xc) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) recvmmsg(0xffffffffffffffff, &(0x7f0000003340)=[{{&(0x7f0000000300)=@ax25, 0x80, &(0x7f0000000780)}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x10000000000001a5) [ 370.696729] dccp_invalid_packet: P.Data Offset(0) too small 03:59:15 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180)=r1, 0x4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x6) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000240)=""/51) r2 = inotify_init() ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x2, 0x8, 0x8}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000002c0)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000300)={0x200, 0x5, 0x9, 0x0, 0x1, 0x1f, 0x0, 0x2, 0x2000000040, 0x5, 0xffffffffffffffff, 0x14508f01, 0x0, 0x7fff, 0x0, 0x3, 0x6, 0xffffffffc822e3dd, 0xffffffffffffcd9e}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@int=0x1c0000, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000003c0)={r3, 0x1, 0x6, @dev={[], 0x16}}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000440)={r4, 0x2}) ioctl$TCSBRK(r0, 0x5409, 0xffffffffffff6f27) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000600)={r4, 0x7, &(0x7f0000000500)=[0x43161dad, 0xffffffff, 0x6, 0x1, 0x9, 0x3, 0x5], &(0x7f0000000540)=[0x2, 0x3, 0x6, 0xfffffffffffffffd, 0x0, 0x8001, 0x2, 0x5], 0x30, 0x5, 0x9, &(0x7f0000000580)=[0xffffffff, 0xfc, 0x7, 0x65eb2920, 0x81], &(0x7f00000005c0)=[0x7d2]}) setns(r0, 0x20000000) sendto$llc(r0, &(0x7f0000000640)="7372f624ff8bf5676cca6cead8b2aa6108cda48ee31cb219b09703395e98f3352078b34b886a730bfa2dc1d19115d673a15ad5a1c7d113d879dd50f7ff63ad0bba95db0806d50e7397e3c30287b0302125e8ab", 0x53, 0x80, &(0x7f00000006c0)={0x1a, 0x0, 0x80, 0x8, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) io_setup(0x9, &(0x7f0000000700)=0x0) io_submit(r5, 0x1, &(0x7f0000000800)=[&(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x65, r0, &(0x7f0000000740)="18d5236d9483b93a5bfcb737eecf77ec53e0833d38781110cc7e4cb19705aea1aa4fb05b3f3a6273a7479bb658a46a1c240a2b7a2cc9e765c27db8c808dfd6580f0d8296824edf381135", 0x4a, 0x1, 0x0, 0x1, r0}]) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000880)={0x1, {0x2, 0x4e20}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e24, @broadcast}, 0x225, 0x2, 0x3, 0x0, 0x2, &(0x7f0000000840)='veth1\x00', 0x100, 0x9, 0x29}) ioctl$KDSKBLED(r0, 0x4b65, 0x3) ioctl$TIOCNOTTY(r0, 0x5422) io_submit(r5, 0x6, &(0x7f0000000f80)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x7, 0xfffffffffffffe01, r0, &(0x7f0000000900)="78a498cbc666e9b87b305732bb6857dc8f3539d3a39e0547c09e81f3bba4e96a4e762e4feaed1f0b00128fbab06d2799262bd534f4602f91d2598192e8e6f65cf6de7aeecf51f98f56ec444373ab30c2a8d2e67ae9b2ebcff9d33315076e04d62ddc1990e67e04f9516629f0e7682a30054c10d1bb549d8126309ec4239d28d3ce034a800a53b3311e461908dfdf1cf456cdbab7df4292afa01b805683c218a0a5210b69cc5936ff60edd1291e0196979785cf69", 0xb4, 0xfffffffffffffffd, 0x0, 0x0, r0}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x7, 0x8, r2, &(0x7f0000000a00)="86f83c957c0099e5845634a01d77327029e21144f049f08976ed8865dc29f8e01863bba32ab8a9492aea17f2896abe7877f4a8afc9868c7c11a8175ee81c293c12c796715db19ea9d0b766a18df8f0bfa6dc66b34588fc0b4ae6185ff13784612b2108874a39b166ccd40c0e42b1a386fdb0c34dc55eaac6f75c4dc682323c0abebf1d477de9562fde64c6f504336c255c1b374721b278f4eeb4541288b38cc125a71e57faa7f29ff055f88c169337fc1c10d5352d8270ad9a306692", 0xbc, 0x6, 0x0, 0x1}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0xc000000000000000, r2, &(0x7f0000000b00)="62db85df98ff0786b4bb027bb3de542de80eb94fed23a5fc6f6a39c03a7bf3b02b34c1202c1f4ae6fa808cd146c1b219c4c021bcdccd53a244687cf4d019c2de8f6aa8e50c91fddbe982bdd9a4aefa7a665ccf853fff98d60fcd98c48b004947c8d012492fe3517a063a2beeb7f9332a8de7e6522faf8182440a15dbc92a7286fc2b299b18052c5de994f0b54e52907564a9649c2f706882c357bd88696ebcedcc61f747873d590cb278c56af6758d5e450542b38a6ec52716f9d6b3232ad27d6a0eb6a3b560e10105a19597e1c7dfdbd45f139a42467192ceb77d267d279451848a5f7014cae50207312c0c", 0xec, 0x8, 0x0, 0x2, r0}, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x7, 0xff, r2, &(0x7f0000000c40)="f15c2deb0889e66fb1e4c04e8c8499a9cb6935e9eeb246432543393d0bba8646645d53083934fe2903eed7598bfea0f4ac73613c3c335016bae40e9e0039e61c158fcb95b736afff72811943a90e4db5cea73e84068d8df638e8a189c9a59b8b2377fd25cd1cd26b6c3abfcfefcfc272a665b41e0fb6a8be18c00bafc14e81a6261aa35c0b42e83da1dadde13ec43f18da40d25c7d48d3", 0x97, 0x1, 0x0, 0x2, r0}, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x50e98ffebb7e1d35, 0x0, r0, &(0x7f0000000d40)="74ab745cf4e1391ef706a7625b3c47b44b2a92a32baef73ac59698fc6d687a1a19f12f8c4afca160c63b02f7127aa84fcc8fd7d3f4bbcbb2ad2825e598957e53514137c22451a26cd35dd55527361db335d571c87e436caa790fb9ac2d3004c7ac8cb3ee7dd99236e2fc6ce60ac31c7953c5a9eaa6ebecd952f1e5f69ad79462c44d4a4b50e1fa63090a661b3a429ce1b15b0ccf192649f79a", 0x99, 0x8, 0x0, 0x1, r0}, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x3, 0x8, r0, &(0x7f0000000e40)="9729451703ccecf90c0691a1e98633c72191eb6258ed2694b5dbc9842c1111cfffafed091ed1c05fb48290393fa674aac6115c151fe3f1beb19b661adb21a5f2a0fc991179373be76ab64b1a33ac8ca380511b711f7a66ae50759fce7bdd6548931fac8fb825dca50079e533a012a09f62c60865f02bd1d7a15a9e4937c802570ec33f501e2d201537864c615300d0f460b393abbfac782a04656195a1bcb02376123536283bbf49ccb638a75918cbbe1452001ec0ffbc45d20ada82cf5d1c95521137cb0cca4da65fc208679315e1c22dcbbb57a6abed4357923726c7b024cc39d48000a7", 0xe5, 0x1, 0x0, 0x1, 0xffffffffffffff9c}]) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000fc0)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001000)={r1, 0x6}, 0x8) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000001040)={0x81, 0x0, [0x5, 0xffffffffffffff80, 0x7, 0x1]}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000010c0)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000001100)={r6, 0x80000, r0}) 03:59:15 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0xe6fe60f191ab1d11, 0x0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @broadcast}}, 0x1e) exit(0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000001c0), 0x8}}) 03:59:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000240)=0x3) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$FUSE_INIT(r3, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x8ad4, 0x200940, 0x7fff, 0x3, 0x3, 0xffffffff}}, 0x50) r4 = syz_open_procfs(0x0, &(0x7f0000000300)="2ae180177564703667") ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x3}}, 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)="c3220049220024ff269e203068fb65de56b3b70a9ec8", 0x16}, {&(0x7f00000003c0)="534a306e9452a051487e7f69136304ce37df01cbd2d8dac420841159d8547169be6b3f328e5d1dfb791d19e6a33cb18e4ae72f31edc3348cc8e1cb07d9f34739c69f8e49f0186952ef971ddc1e4776b66c42dbcc8294a49a483fabeb87c674f9b49e74530a5cbd676b70", 0x6a}], 0x2, 0x0) sendfile(r4, r1, &(0x7f0000000340), 0x8) 03:59:16 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000240)=0x3) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$FUSE_INIT(r3, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x8ad4, 0x200940, 0x7fff, 0x3, 0x3, 0xffffffff}}, 0x50) r4 = syz_open_procfs(0x0, &(0x7f0000000300)="2ae180177564703667") ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x3}}, 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)="c3220049220024ff269e203068fb65de56b3b70a9ec8", 0x16}, {&(0x7f00000003c0)="534a306e9452a051487e7f69136304ce37df01cbd2d8dac420841159d8547169be6b3f328e5d1dfb791d19e6a33cb18e4ae72f31edc3348cc8e1cb07d9f34739c69f8e49f0186952ef971ddc1e4776b66c42dbcc8294a49a483fabeb87c674f9b49e74530a5cbd676b70", 0x6a}], 0x2, 0x0) 03:59:16 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x191100) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x6, 0x9}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x200004, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/10}, 0x18) 03:59:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9a12, 0x2400) futimesat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f0000000140)) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="bacf893ba734445c535e5ce8fb0696ad827229b40edc4f778670f6e7029a61aad6fa67a8e284cb4ca5574f48d9eb3594ac2033864c74464e70af8f49853e64a185a0edcfd24cbdcfdbb1ed6b3b8ddaa137", 0x51}, {&(0x7f00000002c0)="821834b7f9cea7782b8184b74308fb65fbed39ecfadb9cb42a3bac896ea417308594230a1fb23a7b5cb8b7a7bdf204810004da100483d7386b69d879cbeecb8a1d963e49717685a0535fca4f203c59d2ddf2d45099ccde54ecbc12671f479c75803c55f22c52bc4f0f9d2875c7a6c69c6e2bf13e7152bc03f4450b6323fa7e64730e82d45136657dccb5e0dff589ac23e65157ae5d475df9c04f7b62608d07b629c7a48a54f5bbc73dbe6ee7f24796f5fdb6ba4c2291a6a042a6023c04fe9651e74e6480b5b42f50deb9c58ded836081ce930720a5447c7b99e991f048f2fa8c22bf40e1b0", 0xe5}, {&(0x7f00000003c0)="8c247d3a6264c611f62e1156d462f6d1c7ba230ef48a29e80b1a9d7c43d228df7376e132c7cd979b75abde8861fb97ac8473bdd9c9fe68b8c3f7d18c791ecec0ac55263bc5037935e3f6cfb27fb5c852c69cbba689b75c0b28658b643b95fae28bfd0389f3a0230f7a23116f6174d801bcfa84c99077a0fe41fafa7a7196bce2e0142c1a0dafd2641690cf088d3ab957d5562ed2d23b4dd4d6ba262b68a672a27cb44578dea964c3018bbd98b23662f21455c443b430b9e92ddcc7d08379c3", 0xbf}], 0x3, 0xc) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) clock_gettime(0x0, &(0x7f0000000b40)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000000b00)=[{{&(0x7f00000009c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x0, &(0x7f0000000ac0), 0x0, 0x0, 0x0, 0x81}}], 0x2f0, 0x0, &(0x7f0000001000)={0x0, r3+10000000}) 03:59:16 executing program 5: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup2(r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_DO_IT(r3, 0xab03) dup3(r2, r1, 0x200000000000000) 03:59:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000240)=0x3) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$FUSE_INIT(r3, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x8ad4, 0x200940, 0x7fff, 0x3, 0x3, 0xffffffff}}, 0x50) r4 = syz_open_procfs(0x0, &(0x7f0000000300)="2ae180177564703667") ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x3}}, 0x18) 03:59:16 executing program 2: ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'ip6gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0xd, r2}, 0x50) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x71, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) 03:59:16 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000240)=0x3) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$FUSE_INIT(r3, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x8ad4, 0x200940, 0x7fff, 0x3, 0x3, 0xffffffff}}, 0x50) r4 = syz_open_procfs(0x0, &(0x7f0000000300)="2ae180177564703667") ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) 03:59:16 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:16 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) close(r0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) inotify_init() mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:59:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)={0x5c, r3, 0x1, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40014) sendto$inet(r1, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x190, "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"}, &(0x7f00000001c0)=0x198) 03:59:16 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x3) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x8ad4, 0x200940, 0x7fff, 0x3, 0x3, 0xffffffff}}, 0x50) syz_open_procfs(0x0, &(0x7f0000000300)="2ae180177564703667") 03:59:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000300)={0xfff, 0x2, 0x4, 0x6, [], [], [], 0x6, 0x5, 0x5, 0x8, "3b3aecdf0a35d6896a723bae9d22fc6c"}) bind$bt_rfcomm(r2, &(0x7f00000000c0)={0x1f, {0x0, 0x68, 0x7, 0x0, 0x3f, 0x80}, 0x9}, 0xa) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000440)={0x1, 0x0, 0x4, {0x77359400}, 0x9, 0x8}) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000240)=[@cstype3={0x5, 0x7}], 0x1) listen(r2, 0xffffffffffffff71) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='/dev/kvm\x00', r2}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:59:16 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00006cb000/0x2000)=nil) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 03:59:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff83, 0xb, 0x4, [@loopback]}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4440, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x80000001, 0x4, 0x1, r1}) 03:59:16 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 371.891737] QAT: Invalid ioctl [ 371.905376] QAT: Invalid ioctl 03:59:16 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = socket(0x400000011, 0x100000000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000240)="fa", 0x1, 0xfffffffffffffffc) 03:59:16 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x3) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x4, {0x7, 0x1b, 0x8ad4, 0x200940, 0x7fff, 0x3, 0x3, 0xffffffff}}, 0x50) [ 372.008938] QAT: Invalid ioctl [ 372.047438] QAT: Invalid ioctl 03:59:17 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f00006cb000/0x2000)=nil) madvise(&(0x7f000018e000/0x600000)=nil, 0x600000, 0x8) 03:59:17 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000240)=0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:17 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xffffffffffffff78, 0x7ff}, {0x10000, 0x1}]}, 0x14, 0x2) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) write$sndseq(r0, &(0x7f0000000000), 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f00000001c0)) 03:59:17 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz'}, 0x0, 0x0, r0) 03:59:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x894, 0x8}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESDEC=r0, @ANYPTR, @ANYPTR64, @ANYRESOCT=r0, @ANYRES16, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES32=r0], @ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYRES32, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES64=r0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYPTR64, @ANYRESHEX=r0, @ANYRES16=r0, @ANYBLOB="c4289dc3c637b0cc01749ecfce0ee3a6cf21423075150b0f206e980a1b1f5d532c5f4e296d51df7d6a7c576f9ab0e13280b2014bc5019a88c168ca56853b5aa42433abf146746e2d8c194c912ce7", @ANYPTR, @ANYBLOB="73c43b4a5021401eb0b1246637891466f9799d76ca95bac2238aaf7ec13ddf19f278df9b898d25b34c2cd0a33a18337e8a32838f0c0291c23fb1204104993c29df9f84022a3f6baf65d18b15abcd2b78db57f3f0f1c2f3bf807f8de0dee21f142e2acbd39858298bd438707b20040b67026131dd893eecab17053d14663e2df8261b3e4178058b44b65cf5895c7ae8936a2fd217fe79b0b7ad3854f7ffb18014cc29e33df69716721da6ba9be426f680404052129784"], @ANYPTR]], &(0x7f0000000340)="47e467fa5cfc80c8aaebf5f16e8b504c00", 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:59:17 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:17 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) 03:59:17 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x10001}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x9}}, 0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000200)=0x7fffffff) r2 = creat(&(0x7f0000000240)='./file0\x00', 0xa) prctl$seccomp(0x16, 0x3, &(0x7f0000000300)={0xa, &(0x7f0000000280)=[{0x3, 0xfff, 0xc5a, 0x4}, {0x95da, 0x3f, 0x1f}, {0x6, 0x7d, 0xf0d, 0x94c}, {0x80, 0x40, 0x7, 0x6}, {0x1, 0x80000000, 0x0, 0xfffffffffffffff9}, {0x9, 0x7, 0x4, 0x80000000}, {0x5, 0x9, 0x3f, 0xf64}, {0x401, 0x5, 0x7, 0x7}, {0x40, 0x6, 0x5, 0x5}, {0xd8a, 0x8, 0x87, 0x5}]}) ppoll(&(0x7f0000000340)=[{r2, 0x10}, {r0, 0x92}, {r0, 0x2}, {r2, 0x40}, {r2, 0x8}, {r0, 0x4}, {r2, 0x9084}, {r2, 0x89}, {r2, 0x2004}, {r2, 0x8180}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={0xffffffffffff7fff}, 0x8) connect$nfc_llcp(r2, &(0x7f0000000440)={0x27, 0x0, 0x1, 0x1, 0xc0000, 0x8, "d90be56f33bffade15d62c862693919c19601efd880efd76495311715bbedd9ccb7cd02ce621834425ab65afd830e62b94d6694fb5b32c3da92c2f6d0d18d7", 0x9}, 0x60) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f00000004c0)=""/94) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) write$9p(r2, &(0x7f0000000540)="990c5458cd937293b3147188c6156a47cf653e125d2e90610f5b37bff0062e62cefc7f068c7d0b554455faf72c89c779a671c0ab49f2c204d5014c339c7eabc341ab4a6f921b1be3fe717dad3614efbbe44202d84a", 0x55) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000005c0)=0x7f) sendto$inet(r0, &(0x7f0000000600)="888bef4b56bc619f7211b303d5ee9dff6ed7ad2b3791eb1c04892b20d3935766ec009da3c60aac83939cb6a1032f68e944afe2db9bb276ee9c9f0dba7d4202f378426339987c4c371160f8a37b52e502fc6aca78b67ad74aedf3a1bad16f75e6eee33600ba307470b48892ea86e84a8184379a363f21d84e3bcda7817d7594b8ac6daa94f4770a18ed8a8943254465e34df0c0311b6b31f24b6aa7de028ffcffbb57a205c06ce53c7f1d65b14307646478e1b06c273e148a728e6eca220c3f742f82257c5bc443185947b9b0df356a75db35c8f036d48c784d07d3e87d00916570b6db0c3118", 0xe6, 0x801, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000700)={0x749, {{0x2, 0x4e22, @remote}}}, 0x88) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f00000007c0)={0x2, 0x4}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000840)={0x3, 0x70, 0x10000, 0xffffffffffff0000, 0x2, 0x26b, 0x0, 0x101, 0x4, 0x4, 0x2c, 0x9, 0x9, 0x0, 0x4, 0xa74, 0x88a, 0x10001, 0x0, 0x89, 0x7, 0x0, 0x4, 0x4, 0x81, 0x381a, 0x3, 0x5, 0x6, 0x100000000, 0xb47, 0x2, 0x8, 0x4, 0x3, 0x8, 0x6, 0xffffffffffffff81, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000800), 0x1}, 0x20400, 0x2, 0xb50eb21, 0x2, 0x8, 0x7, 0x5}) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000008c0)) getsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000ac0)={0x2, 0x1}) r3 = openat$cgroup_ro(r0, &(0x7f0000000b00)='memory.stat\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r2, 0xab08) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000b40)={0x0, @in={{0x2, 0x4e24, @local}}, 0xe960, 0x6, 0x6, 0x0, 0x1ff}, &(0x7f0000000c00)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000c40)={r4, @in={{0x2, 0x4e22}}}, &(0x7f0000000d00)=0x84) getpeername$netlink(r2, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000dc0)={0x100, 0x5, 0x3, 0x100, r4}, &(0x7f0000000e00)=0x10) r5 = add_key$user(&(0x7f0000000e40)='user\x00', &(0x7f0000000e80)={'syz', 0x2}, &(0x7f0000000ec0)="3d79ba376eda455000ba3efe6d56d45838d622c777221b14398c9d3c8e519279ef6e45aef19ab48b27922170f14bd7df08fdd94ce231e7a637210907e91a2ddd4e249a19471fcb45e5ffe991d318f5d0afc2159d80c10f5bb063d0247bb06076de37", 0x62, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000f40)='trusted\x00', &(0x7f0000000f80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r5, 0x3ff, 0x3, r6) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000006, 0x50, r3, 0x0) 03:59:17 executing program 0: socketpair(0xd, 0xf, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz1\x00') syz_mount_image$nfs(&(0x7f00000006c0)='nfs\x00', &(0x7f0000000800)='./bus\x00', 0x0, 0x3ca, &(0x7f0000001d00), 0x0, &(0x7f0000000040)='noac,') stat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) mount$overlay(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='xino=on,index=off,upperdir=./bus,subj_role=securityuser\\,func=FILE_CHECK,obj_type=selinuxppp1,euid=', @ANYRESDEC=r2, @ANYBLOB=',smackfsfloor=syz1\x00,smackfsroot=*,fowner<', @ANYRESDEC=r3, @ANYBLOB="2c736d61beffffff642f232c00"]) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./bus\x00', 0x2, 0x0, &(0x7f0000000140), 0x4000, &(0x7f0000000180)='!wlan1\x00') 03:59:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000380)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0xfffffffffffffffd, 0x9) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x20c}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x14e23, 0x0, @remote, 0x7}, 0x1c) getpeername$packet(0xffffffffffffffff, &(0x7f0000008e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008e40)=0x14) sendmmsg(r1, &(0x7f0000009540)=[{{&(0x7f0000000000)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000003c0)="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", 0x1000}], 0x1, 0x0, 0x0, 0x8000}, 0x1}, {{&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x3, 0x4, {0xa, 0x4e23, 0x1, @loopback, 0x6431}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000001c0)="3dcd9fbda0d1d41b5afdb639239993bf6f47b92090e171fa6fe24b23657e4e9ae0cb2f8d6b2c0a7c91139cffca34776bee2d50bd", 0x34}, {&(0x7f0000000200)="bf38bfdc87711c09fdfc2fc687ba86d4cdabbc6d473cef831514a838b1e2a55ba7abe82f23b186823b", 0x29}, {&(0x7f0000000240)="14c247f9bfef528abf58beeb03118a9744cb18f117f46cd912d24b02f78b57e9c433aaf005c903dd4283006e5f29b2b5ae43e058dfffa4d0b0c7d7197b9a43a6e5f709a5a2d1b5251dea5c107f1bda65a778e591b3937faed1260994b18928f49ce5b20918d2e5763117f2d833d2b0cd4b474172fd19c0e659a888312faa3cd06b287c429770297b65bac655035e", 0x8e}, {&(0x7f0000000300)="99e42ef338899b5107301427322f390b225fc139301a2883624d87d8e204ec5906027a6d482bba0ff867320fd54e957d9c2e", 0x32}, {&(0x7f0000000340)="2256ec0ad5b06a302466eadc624029", 0xf}], 0x5, &(0x7f0000001440)=[{0x68, 0x109, 0x1, "cdf342b6fe5b80420240c5c940233ce70b383a7f1c4111a6bb05c4bcfc41bd89a46bb27afd15f4a039057556c951a6e1428eab0a7bb6b923bfff78928add61868d8c061bc73e874c46e40339946790f781a1163e34aa"}], 0x68, 0x14}, 0x9094}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000014c0)="ab5783bb6fb94489fad82850450995d38d2372e59b4038d155480f72363f9ecc2eccc3624de8e4acbc3238e14bb697a658bacc6c422f175d724e209b3e1995f02a930e1d0c70db739ea027ed4f52f2e9e245607906b319526439e98ad42c61ccaf6b9d01ae1a7de4235e338b2a8d48b0db326159d2f84a4731006f534197f9562565a6617dc3221e8c691821182c1df89c60b5905176800f632fe330517f004ea685", 0xa2}, {&(0x7f0000001580)="7608536035f7c8ed18c9763f0d6486e0f4", 0x11}, {&(0x7f00000015c0)="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", 0x1000}, {&(0x7f00000025c0)="9c2aa2ee", 0x4}, {&(0x7f0000002600)="c53a9ba96149e696973692b6a3f70101b8d5205dacb9a5cf1ff7db8b0b84ea050cfe990aad73fe55f60a9e9ba5e235263e797c5ac198e8d60b23741cc13c6a88a84204803c112e9d842231933361ce7532739df9d38e3bc88e4440fe88a0b79457fc2b5252a86b6f25578fe365c1d5902ebae5da5117fe7ea1d9ddea90d8e7c31336047f1ac18066f76fe1f9dedaa3740562992fa50e91d2c18b6cab8016f84997922fa0d343169181a1", 0xaa}, {&(0x7f00000026c0)="7b111b70592fcba0fa090684b780c7ac676cb550b64e3aec", 0x18}, {&(0x7f0000002700)="52bf16b7723548d09baaa341cbd1cae8d165e2800b71b538dd5ec508c41020901e5defeaa4cbc45d3d108808d3313050d8910dd02347c1673d510426d9b9689a608408c68848e8ea09f2ac37b9c6657542b89b4229c251419907d9a45b5eec101f", 0x61}, {&(0x7f0000002780)="672e7e8da1b5d13c524d7bab8a54ee956ddcfcd0e471110c43cd0eb153fd472e7ad9e30ccf2e52d75a86d0890972ab6370b18dd4a70e496adfee392a607f9705331ffb538c9ac81ab1b082080204e828c01265bcf7cc9e500be419a9988dfa4ddd62e31ddd82beaffbbd75115c4b6af1a9ab6080c611302f8d", 0x79}, {&(0x7f0000002800)="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", 0x1000}], 0x9, &(0x7f00000038c0)=[{0x30, 0xff, 0x7d, "a876c2c694205852b72a9282594adcd553b6e75cfc375ecfad1c2df1e1"}, {0x48, 0x19f, 0x3, "844aab85ee35076a208335e4b4de0fc4a0945b4df88fd3e720fe367419dd1612e543a4cfc127e267b084376d19bd5003e33a"}, {0x1010, 0x10f, 0x4, "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"}], 0x1088, 0x400c044}, 0x3}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000004980)="ea1753febb6fa30e0a6bf8b066bdc26471c8233069ebb12245109d5ddd2292dc8fbc3209cf2ea9dfef1ae7868f3c92e9deedb2da214086c35d1bcf786b26aaaf46883fb813e416778e8bf9b4116ced2b2163ccb628a9c09467e647fa447d9251d7993407c90fe1ca595c17c047a5d1d65235c11cabb688748b72dfe530b5cdd490bbb1fd921b0c9f5a38c4576a4b0904bbe3a96451035e9cf762cb1be5360365b85d0a0db6bfdac06cac1ab33b9d717db0ba03ffc52f1feb44a7e4f17ab5da704c9616dbd8846463da187005f6071e6dedb5b835df909680915bcc9314d639cc12d7e6ca0e89664fe71d1b73bc6961cc1c64198a05", 0xf5}, {&(0x7f0000004a80)="1537c852b16d0596bd27f1ae0a71c99c9602d37b5a5c2af05bc5f1c2699ae40da664bd3177b45004674d3ee2bfb4d1d8", 0x30}, {&(0x7f0000004ac0)="4c7d8b7e72703debd95fe9a3200d9c3baa5401f056481835aaa8e543938ac9821fd3c5468038be286b8ac7e481589bbb8b43c6ca1b380db2cb70065ab7111c6ded528f6a275f4d496d53d7f243d1a4372580e6d346a5ab393409d5a3c4dbd4840a06dc60e549786fd026d42f4fe4a32bc03a5d3cd7cc2f3e3ff7224adc5edd0a7a27992d2527967e1d422d84265a9dd99f6bda172a821f0a34534b62854fa2911572fe408021e10a8b16cdcf99ddf68254459f230199a8a58e608fde1d743a182fd42f8bb49782409f68b4b6bcd9a1f23af11758596333b2a212bf", 0xdb}, {&(0x7f0000004bc0)="15a81c18b0767a0aca6bf51228ae38aedecfbf6d6cf4eedc0252ad447c705c8ca1e333eb7c3b1c56b34bf07b8cb5c6e3477d2e67a43aba1c8a63a5bf55eb6b67dbbbd4770b704892faffa3f27583a13a1108eba234ba31978cbce3db2ed5efed514b2249062a3ce35c3e1bb621289fc7ae7a4b10e46bfae49156199cfdb6e15db92ac66112cfb13357865b748f9800dfaa", 0x91}, {&(0x7f0000004c80)="b08ba76d883083b53c4cbddbdd583c2d27895e3a98e667e9b8b7b1c3a6d74ef8baeb05bf5b9d482c24f8de82715e2144", 0x30}, {&(0x7f0000004cc0)="5f433cb5eadbbfeef82f87c1ca40d3d03bd2df9da7236d29d1a24ded9f4ea4dfe5420df692bf2cd6803f56fd66d7954412a18ff65e43742268f4552dd863950913663378d232aab1a9760722d2f321c21020a54379778b88501ee3c6c78cdae2a39537323ddafd01b858", 0x6a}, {&(0x7f0000004d40)="24484df43c7e5a7ae1", 0x9}], 0x7, &(0x7f0000009740)=ANY=[@ANYBLOB="d8000000000000008f010000000200008601a22f2e6d417ca12e7083a80a14bc111aa30d8c6247cc2416f7894e257dbf3c7c53aa83c3d6990a9289223ffed088fae6c8a2fbf7d78e57dc38cf6bb6023f1ec47d99637fc8516917ca69012e40b82323ca62ca20b5f4bb4b9abda45996689b03f843c26ced64576d436fc8cd31932add63e14a5209c9f11f1e67ca82b996de07178256169977458a8da09bc27d398d9e2b251d49aba30572d77251ccfd62884adc26710f23820418dc9b8bb38aba7d9794fdbcda90bfd224e269cec00000000000300000000000000011010000040000009a86c334b8fa533a8b7921137342a41aacbb104811697fd3732965eb8d730000180000000000000013010000330c00002695d8dfcf34dce76000000000000000180100f022d38bd1d827285fc617164b4c461db7f6abf8db79bb32c3f4c0f873cdfacf3cba001849c375a2ee1cc81e36dd6e3f11b56045d512ba8a864fde2d45d1629c124974669b742a0bedab85a0386dda8ace833da553088b623a2572e213690e538919344f833fe9dc152140755ec885d267ad70c3161067da7dd8c2a82793fdabf8221cd0488f5243f449d36ae33245d3cd6bf623ac1f8d7f9158a0d4ef2bcac3516a47d70cd14ac87bea04dabbab6e4e2827662e618a89f564544466a4025ace10bb80ce1e73ba1c7672875a544db24beffe9f26fbf806cc29ff7ed8900000000000"], 0x180, 0x14}, 0x8}, {{&(0x7f0000004f80)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000006100)=[{&(0x7f0000005000)="79cfe92089abf5a5b8b1a12e34271eaa091a7896e33777487ca30e495dc5dca922", 0x21}, {&(0x7f0000005040)="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", 0x1000}, {&(0x7f0000006040)="514cd6d7cc7893eb6e068ec3e99e36ac42edb12cb649af525631d0719f628bef56d744e8a44a758d961d640b5a247eda80edc59f0442dcadc5177a95b6196bba269b30c8b5968f1bdf17c81df760878a11e83c62a1f49183e7a922514c5d3ee54076954e66377e953eb4ad87962a47f4b0cce2d24597fbdfb203cebb6ba5f516f719c47cad68b3c6c25d11e2f996ddea1eb2ba5bd30902fe904ccd", 0x9b}], 0x3, &(0x7f0000006140)=[{0x10, 0x102, 0x2}, {0x80, 0x104, 0x5, "5fd6f4da967255c50307802a2c5b2226be082e08d6967d2a5a5c457bcdf2aa26159d481c2b03bbac92cac00248ee189fb366a8737ce715723cb878d2818feb618ffc566e01615e7c7484682043d34d923397c2854c397a24fa375f45943cb6a6be139af3c5d611d70b06332eafac"}, {0x108, 0x1, 0xfffffffffffffff7, "c6517dd57706d18ac48d2ef7d7bf1e769e34062fdcca2e9411158bd6153485700b2b53d43ce24ca0974a82feac65f77a5b20f8cc66b0f5524840120bc8b6020449f6bc88655d868145a59e3e872c07a3616c45e52bc88b11ea701ed49649bb7d06a55cd2473d6c766f16f6c948567cd69ebcb21be7d2d9dee2cf7d53d4a28981b2f2733bed45078cba9e1ac341be3c78489da58abf36726c10f52e8432e9b40ea26f425e8e4ffe3d6c8bd7bfeb9e6c0faeaf1727192fa6d6c4422aac27f763e40c36dc630a13ff3dad345f4106c0e0e66374b923bbcc3062c5949317cf9b4ac90008e37c70db81852a1cf46f3d2ab540f3b6f85d376b0651"}, {0x110, 0x114, 0x7272, "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"}, {0x20, 0x113, 0x5b06b496, "784f0fbd81173ff717f79b360f"}, {0x88, 0x11, 0x0, "0f915c274ef5f3585c9f86f22de5d572427480b090bac3d4352a4898395da01cf03cb18761e72588165b6cb419938ee0b711788935beb67c6fcfa9b3efdf61bc7b116b87816502a77358d3c6f5556a383fb4218a8725579ce302abe85577f438538fdc959e8b115752cd7ce6333f5a71c1a52b"}, {0xf8, 0x108, 0x2, "5ca91c20ad70eca08d74ac0263b4e772db51044117159258c75dbdd7aad00c6e4272eb70fbd50d4cf951dba47503ea1fdb79e497d5fc9406d272a03faba9e7a315a622a540128cdba2822ff9251ad68504f30f0b734b85673fa1143e3303bc13dfc25ed7d06dcb6517106972cb03c0b4604cf5f6b8565f1aa18172465b624455b319d08154ed2b7639a2f7ef07b145c76149a26fd5d426f03f1e903e225ca8696e9ec057f86c917420cee5781429e141f670c8a76e9c7902671d91a036a568e0471834d191063932b1409949d2348bfd63778d631c4cf15f197c442da9fd6574c91b05ac212dbf"}, {0xd0, 0x1, 0xfff, "c072d640fdffe415ca61bcd3b761c89ddbb8a900a099a38072dda29f8ad043479a69fd06fa7ae3167166a1247a6012e5fba74d16c5a27bddd0b4573e5146802e25e4030d76ecf85a284c016369c4c957e840829c1cc6241ad8c7b0d77d2b63aed24dec4262795c9d4383735210fbc1b9fa3a2dac3e4cdc5bcedda54573e8c2e447c4cd279dd4ea3faecea138c353c51e4310bc41d5fd1857ab693a8c3cfd3250cd296f16cc6ce7f64fca28e72b79a1fa4fdcff0e8f951ac943f18b"}], 0x518, 0x1}, 0x6}, {{&(0x7f0000006680)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x3, 0x6, "fed569c061e819e17219d3a2eb9cf5787440540dd4a0cd2fef93599e8d4721a2de504ad7b56cb2f5b52ed1edd8b1af88c85fe6099de1bd2888d0f4577e93ca", 0x32}, 0x80, &(0x7f0000006940)=[{&(0x7f0000006700)="7b688d7cdfe5bde4bf74eb70b57d1e3a5c6ea04cc7d3", 0x16}, {&(0x7f0000006740)="0326a7bd75667873dfa2157809b17b197e4a9d0324c8a9e6ae7546c1f965423718bedad480ce7fbdd8e2efee099fa7385ac5ec4dc5fa124fc00505aa9a3278adb1b4b55aae55429ada739725c5e424d18c589ecca9b6180c5048a770b9965712213051a454f50d3cfcf26eee16ef74e5fe6d2f6db006c3288476ce362f0777f54808bd9ed71e012e62ebddc7a898543f4965c35ffd3d0ab122783255f091ef49f104a7916e4a8361f31f377861af68995ea8d3637511", 0xb6}, {&(0x7f0000006800)="68b35ee54bf7fd76995e3119f586b4b216fe1f304fc9969437ab9f", 0x1b}, {&(0x7f0000006840)="4d288a2f7c77aad4862609d0e82928109903543b16f1a3cf16384ab7f13d071f636cc8a7f8231366e225e9b48bbb2940681cfeb42dfe5b26d0ac7873637ee73db970df862a42", 0x46}, {&(0x7f00000068c0)="d1df133bdfdc72aa864818c733d707e2c1e802216feacc85b853c6065f6f41cbb3bbd7d2486d4828146280e37a4e8ab7fff834e48092584f10c66cf14e11e5883b5022f5b5ea39b429176dc1488047", 0x4f}], 0x5, &(0x7f00000069c0)=[{0x48, 0x11f, 0x7, "9a63c7f5fa2fe967ea337067d05329040cacbd6830caa1e59ceb29cc36d61c76763a8d039c2be2a20df94c8620908a0059cb"}, {0x70, 0x10c, 0x1000, "062ec72bd750c5d84aceb35210d000b0837ca2d7d7ebda5212a563db8c0d79695524a86cd97bf9a73ef2f1f558a4dffc087a105f57847b9ea799189df1b897d9befb77d9bdb088521d59dcd9fd98d7ac1db5cdc4e096d1b8425219024ae2466d"}, {0x60, 0x0, 0x3, "603b2f96c682cfc590c8242897d8a2d36ab972a694355ca072c3158454363b98a625856535133532abc4442eb5b6237054f183cab6c9612a535c2d058ddda6b6a94bf90538f2263f76"}, {0xf0, 0x105, 0xc0ee, "66268ab85fed6a2115cff65fbb328e6457abd9d2be8ce247f4e47a39f4756d7aed5b7db95e711e8b78f62736c69d645c9b019a48c6e6a169d598ba1a49952e904920586cedadd8948bee6bd4b68c9b4e1d1e3b10d6bdf445fbd4767a9446cfe7b2831acd20f398f1eac4650aeef95630febcfdac22e1bc063c2ffca67b1c1251f80b00a94989232f16e39bfee5d8cf511fabe0731c595cb6926a9d4b18018b0b0301c5c1573030e95c489fb6fcf9448c7adbac00a253327ae3f5827dbf50b14c3d3a9dab4fa0a88afd93c90caae871739215932cbc9eed2dd5"}, {0x1010, 0x0, 0x4, "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"}, {0xa8, 0x11f, 0x4, "e132a12167b6c14bb7baeb2e2bbba34d71d345a3ece80f479ee83365a2bfd083cedca380b341d40ca915d211109b7b775b73217af9197368b7a51ed52b5be9ea792a0e500f1614b157d51c86f6bb12ee0f95071174bb2ec2a527239b7f56481b09139373ed25f3bdc14fbdd5fe8ca4c0100ddf81c0a1c73286f659e6bbd82de44a5c2344b745a000439e39bdf58e0fb70388b351"}, {0xc0, 0x114, 0x6, "9dcb873578443dadb503842b67cf8ea52361df0b71a5b752abfc21cf24be64eb30d4bf9469fd7bd53d55e51a71a0840687ef679a288f15e6e260b2948099505ddabdebbb86e321022ad6299f0a2ff5198b080f242e2bf37407ad84207adb09f45a70fed1884bb8611a570a502781d52521751feef6656b19d675f310d530a273acc6cba13e78f68201bb07cd0e2c82760e3e6d29bd53b4f55d6e82b1a0dd26fa0489f6b81fe9fe0729dca637"}, {0x1010, 0x10e, 0x1000, "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"}, {0x40, 0x3a, 0x1, "b366412c527bea0e7e6d1a10e9eb3f368e4fba8856df2262f1f2f22cb4e04ccbcaad76d36ea71346448107e0d8a1"}, {0x38, 0x11d, 0x3, "c352bf80f7e1b2b021fcffc8ff44df11a9706a3052fe125ed39410d099cf119445781e1676"}], 0x2408, 0x20000000}}, {{&(0x7f0000008e80)=@hci={0x1f, r2, 0x1}, 0x80, &(0x7f0000009180)=[{&(0x7f0000008f00)="0ba772a2cccc5f372b1c53a3eceb887054a04bdd38fbe9c4d199bc8b98bc6bbb6e782633cdba8d2310a397a32cdb681446fff8e0828678efaa1c1e8e7c2190a86e15d7d140b776b28432", 0x4a}, {&(0x7f0000008f80)="4a609554dc7a43bd88d58ddaba884317305bd0eb1b139d769485a9e2c43d6c4c999323315207ee97210c02af500d52c1f09b49f113dd8740cff20d2eb2b5de4d9cac05863ccd4848fffe3c4d1ea12bdb660f30b76f3912bfaad94c5712eb8e12c7ec82b72cf5cead342ce837fa4f0fa95ce30ce89ff9cb4fbd6ea7b8e13fbf20c664709c3f2e95e3eaa1b0c3c050681f8c384b8ad8a87d95785428493b21d110c6be555d3b2bcf303e41cf1b74af8f0803f1", 0xb2}, {&(0x7f0000009040)="bce50ebb5b3efe43900890ed7d58b0279af986438253cd30c6795ea38bb1b11d6155f233f87ab3", 0x27}, {&(0x7f0000009080)="115ba9897a07282a25f3a10be766b7bf3d5a6563c5ee418ee4919caae994719a71a2fc55a769f251d063e2e2c8fd3d366ab0517d23fabd47934c19ac03a5772a1f8876121fd164661d59023d76d56db917556e30f14089fe2fa3297ff4177ef452e69f78a10bd67ae86e613ba0363c32704e38367f7e4c20a87366cecdeb9a", 0x7f}, {&(0x7f0000009100)="64e26146ab7878a318c2c53fe78ddf6c514bb90dff4cce18405576f65bbaff70142b41f38153abfd96f3e4a8fb870e5cf418d7de6c8010cdf81f1eded13a535ec2c69a4560fe5cb8db461a3c68d6b15c928902d40e997743848551235587316b38b24c0033c6616176b3222306e2c810e45e0b", 0x73}], 0x5, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000009400)=[{&(0x7f0000009200)="8ac410f0f565c2cdc78b4793469e28d1f260b1deb669fe17d4a34e9d2acf8cd9885976b096125c9e032066aa5c603bec07fc190bbf1e2f9b0eff1ca02921f220a51d6ed7f6437d10ea46bf3010e78a43e48b45053121aa7d13e00d789a95806ab430ea200b85a792d49b13a5fb15e38e0e8e78dd16315e20e66d2b11ef7dd1e48c13f9c10aa97e004088552fb17c24434ffe75e3210dfe4dfa8703ab3326728f829dc1fc976eda1befa584491dab9aba063e1e7bc1229d0ac4a59a874824ba617a54a427b47f0f0a463ebf09aca0638e7936d4571fa83604335806ca7a9e9edf4ab5f8a2bccea42bbb80a032fee31477215245cb8383", 0xf6}, {&(0x7f0000009300)="9462e227a82d81819e39f62c809a0006888447f9c31cda81626c8d866eb9eb1702ad18a30c5d7d2f2d8b810ef4abcd", 0x2f}, {&(0x7f0000009340)="dda52dc08a1ab0165bbf516e9a9c46b06e3a49de949c2f96139202a082683ec696ffcdaca4d2c27ec3ca2a3bf7c439133f426b9014beecb3702b24c3b5647997ccb6f4fbe32fa37178059c22527c680dad17", 0x52}, {&(0x7f00000093c0)="357780caad7a1341e9e3ab627b9fce4e0787d1415556c22a04e500804f39f336622162dc007b0f3bc3cff4bdc38995a380c326c02b3a975a", 0x38}], 0x4, &(0x7f0000009440)=[{0xb0, 0x0, 0x4, "643084d9abfbe2ccf7975df1e0f9a1c5d027e6ded832d80cd1200445f0c0e14dd0c3c1f9ca723f93a9e6efe99858b54470d40ef9a2b2db5b316ff83fb915d498778019c2eed78fe9f1839c4558600ab906fa79ba1ee459be9a5786e275c6c26ae93f49ff06536a83ca009fe77f033b25f85178311f559eda0f116673d61ae3dcbd21c821bcc04d93374b2d3d9ffd782d0ce14568b64717fe7a"}, {0x18, 0x18d, 0x2, "820bcc"}], 0xc8, 0x4}, 0x1d0000}], 0x8, 0x0) [ 372.618847] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted 03:59:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, r3, &(0x7f0000000240)=0x4800, 0x20000102000007) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x800) 03:59:17 executing program 2: r0 = socket$inet(0x2, 0x0, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x20000, 0x0) accept$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x10040) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 03:59:17 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 372.686965] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted 03:59:17 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:17 executing program 3: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d52, 0xfffffffffffffffe}) socket$inet_tcp(0x2, 0x1, 0x0) 03:59:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000100), 0x0) syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:59:17 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:17 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:17 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x4000000004) r1 = pkey_alloc(0x0, 0x3) pkey_free(r1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") socket$vsock_stream(0x28, 0x1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x2, 0x1f}, {0x6, 0x10001}, {0x0, 0xaf}, {0x8, 0xffff}, {0x8, 0x7fffffff}]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x28, 0x2, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0x488) 03:59:18 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xfffffffffffffdf0) socket$inet6(0xa, 0x3, 0x3f) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = geteuid() r3 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78, 0x0, 0x6, {0x2, 0x7ff, 0x0, {0x3, 0xffffffffffffbc2a, 0x169f, 0x82, 0x6, 0x0, 0x0, 0x7f, 0x2, 0xfff, 0x1000, r2, r3, 0x1f}}}, 0x78) openat$cgroup_procs(r1, &(0x7f00000000c0)="63675100750500000063413700", 0x2, 0x0) pipe2(&(0x7f0000000080), 0x800) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000002c0)="e5a1a0125196f3ec09c165d7377bd466", 0x10) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)) munlockall() [ 373.221125] IPVS: ftp: loaded support on port[0] = 21 03:59:18 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, r3, &(0x7f0000000240)=0x4800, 0x20000102000007) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x800) 03:59:18 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:18 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x6, @empty, "626f6e6430000000000600000800"}}, 0x1e) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8937, &(0x7f0000000080)={'bond0\x00'}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'ip6gre0\x00'}}, 0x1e) 03:59:18 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x6) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000000c0)) fcntl$setstatus(r0, 0x4, 0x44000) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = dup2(r2, r1) fallocate(r0, 0x0, 0x0, 0xa6ba0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000001c0)={r4, &(0x7f0000000100)=""/159}) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f0000000240)=0x1) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xffffffffffffffc1) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) syz_open_pts(r0, 0x10200) io_destroy(r5) 03:59:18 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 373.699881] IPVS: ftp: loaded support on port[0] = 21 03:59:18 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) socket$l2tp(0x18, 0x1, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x222000, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000040)) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x37) r2 = socket$inet(0x2, 0x200000000002, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r3, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x81a050c475a097f8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x400000005) pselect6(0x40, &(0x7f0000000140)={0x5, 0x10000, 0x0, 0x8, 0x309, 0x2, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x5, 0x5, 0x0, 0x1, 0x3f, 0x2, 0x2}, &(0x7f00000001c0)={0x0, 0x2, 0x9, 0x8, 0x7, 0x200, 0x6, 0x9}, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000280)={&(0x7f0000000240)={0x1}, 0x8}) 03:59:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, r3, &(0x7f0000000240)=0x4800, 0x20000102000007) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x800) 03:59:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xbcb8, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x40) bind$xdp(r0, &(0x7f0000000280)={0x2c, 0x4, r1, 0x29, r2}, 0x10) r3 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "bc0000d800"}) 03:59:18 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x0, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8001000000002c) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0xf, 0x401, 0x4, 0xff, 0x20, r2, 0xfffffffffffffff9}, 0x2c) connect$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0xff, @local, 0x7}, 0x1c) sendmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80080000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00082dbd7000fcdbdf94f5000000380002000800060075ffffff08000400000000000800040000000000080006000300000014000100ffffffff00000000000000000000200008000400ff01000020000300080007004e24000014000600ff0100000000000000000000000000010800054000010000"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) 03:59:18 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:18 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) recvmmsg(r0, &(0x7f0000003600)=[{{&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/31, 0x1f}, {&(0x7f0000000280)=""/251, 0xfb}], 0x2, &(0x7f00000003c0)=""/6, 0x6, 0xef2}, 0x20}, {{&(0x7f0000000400)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/246, 0xf6}, {&(0x7f0000000640)=""/83, 0x53}, {&(0x7f00000006c0)=""/163, 0xa3}], 0x4, &(0x7f00000007c0)=""/177, 0xb1, 0x3}, 0x1ff}, {{&(0x7f0000000880)=@can, 0x80, &(0x7f0000001b00)=[{&(0x7f0000000900)=""/213, 0xd5}, {&(0x7f0000000a00)=""/202, 0xca}, {&(0x7f0000000b00)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x1}, 0x3}, {{&(0x7f0000001b40)=@xdp, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001bc0)=""/74, 0x4a}, {&(0x7f0000001c40)=""/140, 0x8c}, {&(0x7f0000001d00)=""/130, 0x82}], 0x3, &(0x7f0000001e00)=""/157, 0x9d, 0x6}, 0x3}, {{&(0x7f0000001ec0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003040)=[{&(0x7f0000001f40)=""/60, 0x3c}, {&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/88, 0x58}, {&(0x7f0000003000)=""/36, 0x24}], 0x4, 0x0, 0x0, 0x1}, 0x200}, {{&(0x7f0000003080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003380)=[{&(0x7f0000003100)=""/165, 0xa5}, {&(0x7f00000031c0)=""/224, 0xe0}, {&(0x7f00000032c0)=""/112, 0x70}, {&(0x7f0000003340)=""/41, 0x29}], 0x4}, 0x8}, {{&(0x7f00000033c0)=@can, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003440)=""/102, 0x66}], 0x1, &(0x7f0000003500)=""/228, 0xe4, 0x7}, 0x6}], 0x7, 0x10102, &(0x7f0000000100)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 03:59:19 executing program 1: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xbcb8, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x40) bind$xdp(r0, &(0x7f0000000280)={0x2c, 0x4, r1, 0x29, r2}, 0x10) r3 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "bc0000d800"}) 03:59:19 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='rdma.max\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x1, {{0x2, 0x0, @multicast1}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 03:59:19 executing program 0: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0xf155, &(0x7f0000ffc000/0x1000)=nil, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) 03:59:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, r3, &(0x7f0000000240)=0x4800, 0x20000102000007) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x800) 03:59:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:19 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x0, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8001000000002c) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0xf, 0x401, 0x4, 0xff, 0x20, r2, 0xfffffffffffffff9}, 0x2c) connect$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0xff, @local, 0x7}, 0x1c) sendmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80080000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00082dbd7000fcdbdf94f5000000380002000800060075ffffff08000400000000000800040000000000080006000300000014000100ffffffff00000000000000000000200008000400ff01000020000300080007004e24000014000600ff0100000000000000000000000000010800054000010000"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) 03:59:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) listen(r0, 0x0) r1 = accept4(r0, &(0x7f00000015c0)=@can, &(0x7f0000001640)=0x80, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000000)=0x54) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x141001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x10ed) tkill(0x0, 0x1000000000015) 03:59:19 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:59:19 executing program 3: write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x48) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000280)=0xf3, 0x4) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x8, 0x2) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0xffffffffffff7fff, 0x8, 0x0, 0x7, 0x10, 0x9}) 03:59:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:19 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:59:19 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000640)) write$binfmt_aout(r0, &(0x7f0000000180)={{0x10b, 0x5, 0x1ff, 0x7a, 0x1db, 0x3, 0x1ac}, "c599f1d59f84d34f2a2ef41f37aaa6ba269c892d3dd5d4a2b3d39d897d1395b49e330215d769eb8ff8023f2da1b27f7c86aacf8ecd14077f66f2e059912f6aab6d8255b2b98d451154dc75d330a61d82b5c43574215fc66fe4a8e28fc7d0c9b47e95eb0e57b6404bdcf76fb69d", [[], [], [], []]}, 0x48d) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000140)={0x37, 0xf, 0xc, 0x6, 0x2, 0x0, 0x5, 0xd8, 0xffffffffffffffff}) exit(0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000680)={0xb, 0x77, 0x2, 0x9}, 0xb) 03:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:20 executing program 4: socket$kcm(0x29, 0xc4c05250959be157, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:59:20 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:20 executing program 2: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_team\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000900)="89", 0x1) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)={0x0, 0x0, 0x200, 0x0, 0x3f, 0x400}) sendto$inet(r0, &(0x7f00000003c0), 0xfffffdef, 0x9405000000000000, &(0x7f00000001c0)={0x2, 0xdc05, @rand_addr}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x404800, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 03:59:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:20 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000000480)={0xa, 0x0, 0x6, @loopback}, 0x1c) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x90608084}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)=@deltaction={0x124, 0x31, 0x300, 0x70bd2c, 0x25dfdbfb, {0x0, 0x7, 0xffffffffffff7fff}, [@TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @TCA_ACT_TAB={0xbc, 0x1, [{0x14, 0x5, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}]}, 0x124}}, 0x10) sendto$llc(r0, &(0x7f00000001c0)="3aad453979a6a30f7b4055ab8c78e967cbaa90ab65238e51a86c510d603a6413da7022407e4805e17c22f76bab249c397053cda9b9159117b091427de2c1e53d18f461", 0x43, 0x4040000, &(0x7f0000000380)={0x1a, 0x108, 0xffffffffffffffff, 0x8, 0xd882, 0x0, @broadcast}, 0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000400)=0xfffffffffffffd28) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="c0df92d07b4b16113630e15e8175ec3f9feabcd4619ecdc138bbf6bf78cbd2ac423f623b636b203b90c0372252ad485fd784524a89866e45f8619acf0a09fdd86a0ef25aa36132c09f33e4d10d37602e1123ab31ed093c033798350cbb098663bda07a08e4444061013090fe7a6bc39a19d4ea9b56d81dc5823661386524340980f73a76149b47c66cf9ffb023d1d3a07b9b0280bf407189baa867f0b6283ca10b83872276119a6646e976e8256c8c803f62feb2ee8a48098e3e9b15e09c42cbdcaf84a23d12a66867f3d62ffb5bbd6a378ffe9fc89847b26d98a3f4734e4667a8f2bd6eaeaaa8096a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='bdev\x00', 0x0, &(0x7f0000000480)) bind$inet6(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x1, 0x4) 03:59:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000001c0)) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = shmget(0x3, 0x4000, 0x78000200, &(0x7f0000ffc000/0x4000)=nil) shmat(r2, &(0x7f0000fff000/0x1000)=nil, 0x4000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000040)={{{@in6, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) shmctl$IPC_RMID(r2, 0x0) 03:59:20 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:21 executing program 2: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x4e24, @loopback}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) r2 = socket(0x10, 0x802, 0x0) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0xc0000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000003c0)={'team0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0, 0x0, 0xd8b0, 0x0, @time, {0xb28, 0xd7b3}, {0x14c7, 0x6}, @queue={0xdf, {0x5, 0x20000}}}], 0x30) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000000600", 0x4bfd}) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f00000000c0)=0x200) sendto$unix(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x8084, &(0x7f0000000740)=@abs={0x0, 0x0, 0x4e23}, 0x6e) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, "4a6dcd57f7f10eae8aa69bdefc837a361ac7469a9ff94cca43026131708220c7fc2c5483bbfa815f2832c3c69eb014b64f25df2c6930c03d7661e3b2d4ed85a3", "8d2f63b66744cc6934c2d68586cdf29fdc2bff8469b8c21f4b8dbe6582ec91a8", [0x1, 0xffffffffffffffc1]}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) 03:59:21 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 03:59:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:21 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = semget$private(0x0, 0x7, 0x400) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000400)=""/232) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000007c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f00000004c0)}}, &(0x7f0000000600)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x77359400}}, &(0x7f0000000200)={{}, {0x0, 0x0}}) arch_prctl(0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f0000000380), &(0x7f00000003c0)=0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x0) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x4, @mcast1, 0x7fff}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x5a}, 0x8) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={0x0, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @dev}}}, 0x108) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000840)) semget$private(0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC=r4, @ANYRESOCT=0x0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES64=r0]]], 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/46) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) ioctl$BLKROGET(r5, 0x125e, &(0x7f0000000140)) sendto$inet(r1, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) dup3(r0, r1, 0x0) 03:59:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 376.410571] device team0 left promiscuous mode 03:59:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000100)=""/11, 0x3bd) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000240)) r5 = syz_open_pts(r0, 0x0) ioctl(r1, 0x8001, &(0x7f0000000280)="ca62b2a30969f2ebe0a8d5ef713ed354165aa81efe76b323eeeff9d3672edc9f5c156979f9c927b25a98a53ae05ca2eff652c7526631f35af7d2dd8ad23c860724e8b10258c3f411a1bd2825240dcaa4a3095f96f69c23fd2827fa1155e063a7feca0e408a858da5664e4ed649ee5bac5989d3ad554741b8f192a1c62dc883f5da8b0d92049576cd4e75d486125fd6391b8e8128e7fbd1") close(r3) dup2(r4, r5) 03:59:21 executing program 3: mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x33, @empty, 0x4e24, 0x4, 'lblcr\x00', 0x1, 0x1, 0xa}, 0x2c) mbind(&(0x7f0000b1e000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x7f, 0x3) [ 376.436590] device team_slave_0 left promiscuous mode 03:59:21 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 376.462287] device team_slave_1 left promiscuous mode 03:59:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 377.160651] device team0 entered promiscuous mode [ 377.165846] device team_slave_0 entered promiscuous mode [ 377.171709] device team_slave_1 entered promiscuous mode [ 377.179145] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.192466] device team0 left promiscuous mode [ 377.197365] device team_slave_0 left promiscuous mode [ 377.197577] device team_slave_1 left promiscuous mode [ 377.503313] device team0 entered promiscuous mode [ 377.508357] device team_slave_0 entered promiscuous mode [ 377.513928] device team_slave_1 entered promiscuous mode [ 377.520679] 8021q: adding VLAN 0 to HW filter on device team0 03:59:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:22 executing program 3: r0 = socket$inet(0x10, 0x800, 0x6) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:59:22 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000100)={0x8, 0x8, 0xfb3}, 0xc) 03:59:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x10, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x2d3967c9830b547) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000080)=r3) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000540)={0xd0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000340)="643e67660f3a61ca9bbaf80c66b8bc5d158866efbafc0c66ed66b9800000c00f326635001000000f30f40f38c94bf80f380b5775260f01ca0f21360f180ad810", 0x40}], 0x2d3, 0xfffffffffffffffc, &(0x7f0000000280), 0x0) 03:59:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 03:59:22 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:22 executing program 3: r0 = socket$inet6(0xa, 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000040)=0x3) 03:59:22 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/netfilter\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x1005}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x200800, 0x2, "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", 0xd7, 0x7fff, 0xfffffffffffffffd, 0xfffffffffffffff8, 0x100000000, 0x1, 0xe3, 0x1}, r2}}, 0x120) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000080)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x1000000, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) 03:59:22 executing program 3: prctl$setmm(0x23, 0x7, &(0x7f0000ff9000/0x1000)=nil) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e22, @rand_addr=0xb88e}, {0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x60, {0x2, 0x4e20, @local}, 'nr0\x00'}) 03:59:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 377.937063] overlayfs: unrecognized mount option "smackfsdef=tRusted#]md5sumeth1){" or missing value 03:59:23 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 378.014191] overlayfs: unrecognized mount option "smackfsdef=tRusted#]md5sumeth1){" or missing value 03:59:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 03:59:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000140)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/225, 0xe1}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f00000003c0)=""/161, 0xa1}, {&(0x7f0000000480)}, {&(0x7f00000016c0)=""/247, 0xf7}, {&(0x7f00000004c0)=""/60, 0x3c}], 0x7, &(0x7f00000017c0)=""/117, 0x75, 0x2}, 0x1) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000000), 0xc, &(0x7f0000000640)={&(0x7f0000001900)=@ipv4_getaddr={0x0, 0x16, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x40, 0x100, 0xff, r1}, [@IFA_LOCAL={0x0, 0x2, @multicast2}, @IFA_ADDRESS={0x0, 0x1, @multicast2}, @IFA_LABEL={0x0, 0x3, 'veth0_to_team\x00'}, @IFA_LABEL={0x0, 0x3, 'ip6gretap0\x00'}, @IFA_BROADCAST={0x0, 0x4, @broadcast}, @IFA_CACHEINFO={0x0, 0x6, {0x7, 0x7ff, 0x6, 0x100000000}}, @IFA_LABEL={0x0, 0x3, 'bond_slave_0\x00'}, @IFA_LABEL={0x0, 0x3, 'veth1_to_bond\x00'}]}, 0xfffffdaf}}, 0xfd583bf00c7f8b95) 03:59:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) r4 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000600)="f95e0139fa7af261f6ed534b45e15c3b90ef064a30515b8a92ddccfb83d9a7ea9cf8730f0bb5a208f067a3fc5fe3861130fe9653824b2a8a9dceed203d10ba3d991192c9fe9135f23e9caa900c617cbcfe040f3d52ff6aeb96", 0x59, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000680)="74d1f36114c27a1ed317970050e154f41c8d673f680ff5934c080a163d9ac030b66f7239e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bda4654a", 0x75) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000340)={0x3, 0xfffffffffffffff7, 0xa, 0x2, 0x395, 0x3ff, 0x4, 0x6bd2}, &(0x7f0000000380)=0x20) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000c15000/0x1000)=nil, 0x8, 0x0, 0x2, &(0x7f0000961000/0x2000)=nil, 0x6}) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 03:59:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0x4048ae9b, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f0000000000)) creat(&(0x7f0000000080)='./file0\x00', 0x20) 03:59:23 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 03:59:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:23 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a"], 0x5c) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="cb2b9b5255175d43fca389e340fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa6053ebc9"], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r5 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0xffffffffffffffe0, 0x400880) r6 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x10000000000100, &(0x7f0000000780)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r7, 0x20000000000000c7, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r6, &(0x7f0000001000), 0xffffffffffffffe1, 0x9, 0x0, 0x0, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) memfd_create(&(0x7f0000000640)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281e4ee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) sendfile(r4, r4, &(0x7f00000007c0), 0x2000005) 03:59:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:23 executing program 1 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:23 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 378.682917] FAULT_INJECTION: forcing a failure. [ 378.682917] name failslab, interval 1, probability 0, space 0, times 0 03:59:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) r4 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000600)="f95e0139fa7af261f6ed534b45e15c3b90ef064a30515b8a92ddccfb83d9a7ea9cf8730f0bb5a208f067a3fc5fe3861130fe9653824b2a8a9dceed203d10ba3d991192c9fe9135f23e9caa900c617cbcfe040f3d52ff6aeb96", 0x59, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000680)="74d1f36114c27a1ed317970050e154f41c8d673f680ff5934c080a163d9ac030b66f7239e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bda4654a", 0x75) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000340)={0x3, 0xfffffffffffffff7, 0xa, 0x2, 0x395, 0x3ff, 0x4, 0x6bd2}, &(0x7f0000000380)=0x20) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000c15000/0x1000)=nil, 0x8, 0x0, 0x2, &(0x7f0000961000/0x2000)=nil, 0x6}) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) [ 378.768413] CPU: 1 PID: 14880 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 378.777058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.777067] Call Trace: [ 378.777094] dump_stack+0x244/0x39d [ 378.777122] ? dump_stack_print_info.cold.1+0x20/0x20 [ 378.777144] ? debug_smp_processor_id+0x1c/0x20 [ 378.777165] ? perf_trace_lock+0x14d/0x7a0 [ 378.777193] should_fail.cold.4+0xa/0x17 [ 378.777216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 378.777236] ? perf_trace_lock+0x14d/0x7a0 [ 378.777266] ? find_held_lock+0x36/0x1c0 [ 378.777312] ? find_held_lock+0x36/0x1c0 [ 378.777361] ? perf_trace_sched_process_exec+0x860/0x860 [ 378.777388] ? wait_for_completion+0x8a0/0x8a0 [ 378.777415] __should_failslab+0x124/0x180 [ 378.777437] should_failslab+0x9/0x14 [ 378.777457] kmem_cache_alloc+0x2be/0x730 [ 378.777480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.777499] ? check_preemption_disabled+0x48/0x280 [ 378.777593] getname_flags+0xd0/0x590 [ 378.777620] getname+0x19/0x20 [ 378.777642] do_sys_open+0x383/0x700 [ 378.777666] ? filp_open+0x80/0x80 [ 378.777684] ? __ia32_sys_read+0xb0/0xb0 [ 378.777707] ? trace_hardirqs_off_caller+0x300/0x300 [ 378.777735] __x64_sys_openat+0x9d/0x100 [ 378.777758] do_syscall_64+0x1b9/0x820 [ 378.777780] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 378.777803] ? syscall_return_slowpath+0x5e0/0x5e0 [ 378.777827] ? trace_hardirqs_on_caller+0x310/0x310 [ 378.777849] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 378.777871] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 378.777896] ? __switch_to_asm+0x40/0x70 [ 378.777912] ? __switch_to_asm+0x34/0x70 [ 378.777938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.777970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.777984] RIP: 0033:0x457569 [ 378.778004] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.778014] RSP: 002b:00007f30c91bfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 378.778032] RAX: ffffffffffffffda RBX: 00007f30c91bfc90 RCX: 0000000000457569 [ 378.778043] RDX: 0000000000080240 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 378.778054] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 378.778066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30c91c06d4 [ 378.778077] R13: 00000000004c2e8a R14: 00000000004d4668 R15: 0000000000000005 03:59:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:24 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:24 executing program 1 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendmsg(r0, &(0x7f0000000200)={0x0, 0xfffffff2, &(0x7f00000001c0)=[{&(0x7f0000000040), 0xffef}], 0x274, &(0x7f0000000200)}, 0x100000000000007) 03:59:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) r4 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000600)="f95e0139fa7af261f6ed534b45e15c3b90ef064a30515b8a92ddccfb83d9a7ea9cf8730f0bb5a208f067a3fc5fe3861130fe9653824b2a8a9dceed203d10ba3d991192c9fe9135f23e9caa900c617cbcfe040f3d52ff6aeb96", 0x59, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000680)="74d1f36114c27a1ed317970050e154f41c8d673f680ff5934c080a163d9ac030b66f7239e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bda4654a", 0x75) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000340)={0x3, 0xfffffffffffffff7, 0xa, 0x2, 0x395, 0x3ff, 0x4, 0x6bd2}, &(0x7f0000000380)=0x20) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000c15000/0x1000)=nil, 0x8, 0x0, 0x2, &(0x7f0000961000/0x2000)=nil, 0x6}) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) [ 379.225885] FAULT_INJECTION: forcing a failure. [ 379.225885] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 379.237756] CPU: 0 PID: 14896 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 379.246276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.255653] Call Trace: [ 379.258267] dump_stack+0x244/0x39d [ 379.261921] ? dump_stack_print_info.cold.1+0x20/0x20 [ 379.267135] ? lock_is_held_type+0x210/0x210 [ 379.271575] should_fail.cold.4+0xa/0x17 03:59:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0xae) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="000775b005e381e5b3b60c070054dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000380)={0x0, {0x2, 0x0, @local}, {}, {0x2, 0x3, @remote}}) socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(0xffffffffffffffff, &(0x7f00000013c0)="7d61929e236105", 0x7, 0x1, &(0x7f0000000040)={0xa, 0x4e22, 0x1916, @mcast2, 0x5304}, 0x1c) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 379.275664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 379.280797] ? debug_smp_processor_id+0x1c/0x20 [ 379.285487] ? perf_trace_lock+0x14d/0x7a0 [ 379.289764] ? mark_held_locks+0x130/0x130 [ 379.294026] ? check_preemption_disabled+0x48/0x280 [ 379.299124] ? _parse_integer+0x134/0x180 [ 379.303300] ? debug_smp_processor_id+0x1c/0x20 [ 379.307991] ? perf_trace_lock+0x14d/0x7a0 [ 379.312242] ? _kstrtoull+0x188/0x250 [ 379.316065] ? _parse_integer+0x180/0x180 [ 379.320234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:59:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 379.325797] ? check_preemption_disabled+0x48/0x280 [ 379.330849] ? lock_is_held_type+0x210/0x210 [ 379.335300] ? debug_smp_processor_id+0x1c/0x20 [ 379.339987] ? perf_trace_lock+0x14d/0x7a0 [ 379.344246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.349812] ? should_fail+0x22d/0xd01 [ 379.353711] ? lock_is_held_type+0x210/0x210 [ 379.358153] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 379.363325] ? perf_trace_lock+0x14d/0x7a0 [ 379.367689] __alloc_pages_nodemask+0x34b/0xdd0 [ 379.372377] ? find_held_lock+0x36/0x1c0 [ 379.376453] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 379.381501] ? find_held_lock+0x36/0x1c0 [ 379.385638] ? trace_hardirqs_off+0xb8/0x310 [ 379.390073] cache_grow_begin+0xa5/0x8c0 [ 379.394155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.399723] ? check_preemption_disabled+0x48/0x280 [ 379.404798] kmem_cache_alloc+0x66b/0x730 [ 379.408963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.414525] getname_flags+0xd0/0x590 [ 379.418350] getname+0x19/0x20 [ 379.421568] do_sys_open+0x383/0x700 [ 379.425299] ? filp_open+0x80/0x80 [ 379.428877] ? __ia32_sys_read+0xb0/0xb0 [ 379.432964] ? trace_hardirqs_off_caller+0x300/0x300 [ 379.438082] __x64_sys_openat+0x9d/0x100 [ 379.442155] do_syscall_64+0x1b9/0x820 [ 379.446056] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 379.451437] ? syscall_return_slowpath+0x5e0/0x5e0 [ 379.456377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.461233] ? trace_hardirqs_on_caller+0x310/0x310 [ 379.466264] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 379.471298] ? prepare_exit_to_usermode+0x291/0x3b0 [ 379.476335] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.481206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.486402] RIP: 0033:0x457569 [ 379.489610] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.508528] RSP: 002b:00007f30c91e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 379.516265] RAX: ffffffffffffffda RBX: 00007f30c91e0c90 RCX: 0000000000457569 [ 379.523546] RDX: 0000000000080240 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 379.530823] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 379.538101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30c91e16d4 [ 379.545376] R13: 00000000004c2e8a R14: 00000000004d4668 R15: 0000000000000005 03:59:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=""/160, &(0x7f0000000140)=0xa0) clock_gettime(0xfffffffffffffffe, &(0x7f00000002c0)) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x10, 0x34700}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000003100290800000000000000df03000000180000001400010000000000000000000000001535de0001"], 0x2c}}, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000180)=0x7) 03:59:24 executing program 1 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:24 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x14) listen(r0, 0x800000002) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x80020}, 0xc) sendto$inet6(r1, &(0x7f00000001c0)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x8000, 0x0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f00000000c0)={0x6, 0x4}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="590000f11f75803ccc56951986a7551100000000000000e9ff26000000"], 0x14090) 03:59:24 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 379.740889] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 379.757964] FAULT_INJECTION: forcing a failure. [ 379.757964] name failslab, interval 1, probability 0, space 0, times 0 03:59:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) r4 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000600)="f95e0139fa7af261f6ed534b45e15c3b90ef064a30515b8a92ddccfb83d9a7ea9cf8730f0bb5a208f067a3fc5fe3861130fe9653824b2a8a9dceed203d10ba3d991192c9fe9135f23e9caa900c617cbcfe040f3d52ff6aeb96", 0x59, 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f0000000680)="74d1f36114c27a1ed317970050e154f41c8d673f680ff5934c080a163d9ac030b66f7239e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bda4654a", 0x75) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000340)={0x3, 0xfffffffffffffff7, 0xa, 0x2, 0x395, 0x3ff, 0x4, 0x6bd2}, &(0x7f0000000380)=0x20) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000c15000/0x1000)=nil, 0x8, 0x0, 0x2, &(0x7f0000961000/0x2000)=nil, 0x6}) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) [ 379.798229] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 379.856847] CPU: 1 PID: 14919 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 379.865397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.874764] Call Trace: [ 379.877369] dump_stack+0x244/0x39d [ 379.881018] ? dump_stack_print_info.cold.1+0x20/0x20 [ 379.886218] ? debug_smp_processor_id+0x1c/0x20 [ 379.890893] ? perf_trace_lock+0x14d/0x7a0 [ 379.895138] should_fail.cold.4+0xa/0x17 [ 379.899215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 379.904325] ? print_usage_bug+0xc0/0xc0 [ 379.908408] ? __lock_acquire+0x62f/0x4c20 [ 379.912648] ? zap_class+0x640/0x640 [ 379.916381] ? find_held_lock+0x36/0x1c0 [ 379.920474] ? perf_trace_sched_process_exec+0x860/0x860 [ 379.925943] __should_failslab+0x124/0x180 [ 379.930186] should_failslab+0x9/0x14 [ 379.933991] kmem_cache_alloc+0x2be/0x730 [ 379.938146] ? zap_class+0x640/0x640 [ 379.941870] ? mark_held_locks+0x130/0x130 [ 379.946116] __alloc_file+0xa8/0x470 [ 379.949835] ? file_free_rcu+0xd0/0xd0 [ 379.953728] ? mark_held_locks+0x130/0x130 [ 379.957985] ? find_held_lock+0x36/0x1c0 [ 379.962065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.967623] ? check_preemption_disabled+0x48/0x280 [ 379.972650] alloc_empty_file+0x72/0x170 [ 379.976726] path_openat+0x170/0x5150 [ 379.980543] ? lock_is_held_type+0x210/0x210 [ 379.984958] ? unwind_dump+0x190/0x190 [ 379.988861] ? zap_class+0x640/0x640 [ 379.992588] ? path_lookupat.isra.43+0xc00/0xc00 [ 379.997348] ? unwind_get_return_address+0x61/0xa0 [ 380.002289] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 380.007353] ? expand_files.part.8+0x571/0x9a0 [ 380.011961] ? find_held_lock+0x36/0x1c0 [ 380.016040] ? __alloc_fd+0x347/0x6e0 [ 380.019860] ? lock_downgrade+0x900/0x900 [ 380.024009] ? getname+0x19/0x20 [ 380.027390] ? kasan_check_read+0x11/0x20 [ 380.031547] ? do_raw_spin_unlock+0xa7/0x330 [ 380.035961] ? do_raw_spin_trylock+0x270/0x270 [ 380.040551] ? __lock_is_held+0xb5/0x140 [ 380.044615] ? __check_object_size+0xb1/0x782 [ 380.049127] ? _raw_spin_unlock+0x2c/0x50 [ 380.053304] ? __alloc_fd+0x347/0x6e0 [ 380.057127] do_filp_open+0x255/0x380 [ 380.060933] ? may_open_dev+0x100/0x100 [ 380.064912] ? strncpy_from_user+0x411/0x5a0 [ 380.069337] ? digsig_verify+0x1530/0x1530 [ 380.073600] ? get_unused_fd_flags+0x122/0x1a0 [ 380.078194] ? getname_flags+0x26e/0x590 [ 380.082279] do_sys_open+0x568/0x700 [ 380.086003] ? filp_open+0x80/0x80 [ 380.089547] ? __ia32_sys_read+0xb0/0xb0 [ 380.093620] ? trace_hardirqs_off_caller+0x300/0x300 [ 380.098739] __x64_sys_openat+0x9d/0x100 [ 380.102822] do_syscall_64+0x1b9/0x820 [ 380.106724] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 380.112111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 380.117050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.121900] ? trace_hardirqs_on_caller+0x310/0x310 [ 380.126925] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 380.131951] ? prepare_exit_to_usermode+0x291/0x3b0 [ 380.136980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.141842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.147034] RIP: 0033:0x457569 [ 380.150234] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.169237] RSP: 002b:00007f30c91e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 380.176983] RAX: ffffffffffffffda RBX: 00007f30c91e0c90 RCX: 0000000000457569 [ 380.184261] RDX: 0000000000080240 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 380.191540] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 380.198814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30c91e16d4 [ 380.206087] R13: 00000000004c2e8a R14: 00000000004d4668 R15: 0000000000000005 03:59:25 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x480, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x101000, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2000200000015) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000000240)}}, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x31, 0x5, @tid=r1}, &(0x7f00000001c0)) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) r3 = gettid() ioctl$int_in(r2, 0x800000c0045005, &(0x7f0000000040)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, &(0x7f0000001680)) tkill(r3, 0x15) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 03:59:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:25 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:25 executing program 1 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:25 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40000, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x1010, r1, 0x0) r2 = socket(0xa, 0x1, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0xfffffffffffffffd, 0x0, 'lblcr\x00\x00\x00 \x00'}, 0x2c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x3ff, @remote, 0x3ff}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r4, 0x1, 0x5, 0x1, 0x1cd, 0xfffffffffffffffc}, &(0x7f0000000280)=0x14) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) [ 380.557992] FAULT_INJECTION: forcing a failure. [ 380.557992] name failslab, interval 1, probability 0, space 0, times 0 03:59:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfd80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) set_tid_address(&(0x7f00000002c0)) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000300), 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r2, 0xffffffffffffffff}, 0x8) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e20, 0x1000, @mcast2}, {0xa, 0x4e21, 0x7, @empty, 0x3}, 0x3, [0x96, 0x5, 0xffffffffffffffc7, 0x5, 0x401, 0x0, 0x7, 0x4]}, 0x5c) [ 380.615013] CPU: 1 PID: 14950 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 380.623577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.632937] Call Trace: [ 380.635550] dump_stack+0x244/0x39d [ 380.639234] ? dump_stack_print_info.cold.1+0x20/0x20 [ 380.644463] ? debug_smp_processor_id+0x1c/0x20 [ 380.649198] ? perf_trace_lock+0x14d/0x7a0 [ 380.653439] should_fail.cold.4+0xa/0x17 [ 380.657513] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 380.662696] ? is_bpf_text_address+0xd3/0x170 [ 380.667217] ? kernel_text_address+0x79/0xf0 [ 380.671632] ? __kernel_text_address+0xd/0x40 [ 380.676150] ? unwind_get_return_address+0x61/0xa0 [ 380.681099] ? __save_stack_trace+0x8d/0xf0 [ 380.685432] ? find_held_lock+0x36/0x1c0 [ 380.689509] ? do_syscall_64+0x1b9/0x820 [ 380.693587] ? perf_trace_sched_process_exec+0x860/0x860 [ 380.699076] __should_failslab+0x124/0x180 [ 380.703319] should_failslab+0x9/0x14 [ 380.707111] kmem_cache_alloc_trace+0x2d7/0x750 [ 380.711802] ? __might_sleep+0x95/0x190 [ 380.715841] apparmor_file_alloc_security+0x17b/0xac0 [ 380.721071] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 380.726637] ? apparmor_path_rename+0xcd0/0xcd0 [ 380.731336] ? rcu_read_lock_sched_held+0x14f/0x180 [ 380.736364] ? kmem_cache_alloc+0x33a/0x730 [ 380.740721] security_file_alloc+0x4c/0xa0 [ 380.744973] __alloc_file+0x12a/0x470 [ 380.748785] ? file_free_rcu+0xd0/0xd0 [ 380.752692] ? mark_held_locks+0x130/0x130 [ 380.756964] ? find_held_lock+0x36/0x1c0 [ 380.761026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.766556] ? check_preemption_disabled+0x48/0x280 [ 380.771602] alloc_empty_file+0x72/0x170 [ 380.775656] path_openat+0x170/0x5150 [ 380.779455] ? lock_is_held_type+0x210/0x210 [ 380.783866] ? unwind_dump+0x190/0x190 [ 380.787774] ? zap_class+0x640/0x640 [ 380.791535] ? path_lookupat.isra.43+0xc00/0xc00 [ 380.796306] ? unwind_get_return_address+0x61/0xa0 [ 380.801238] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 380.806263] ? expand_files.part.8+0x571/0x9a0 [ 380.810875] ? find_held_lock+0x36/0x1c0 [ 380.814947] ? __alloc_fd+0x347/0x6e0 [ 380.818918] ? lock_downgrade+0x900/0x900 [ 380.823055] ? getname+0x19/0x20 [ 380.826419] ? kasan_check_read+0x11/0x20 [ 380.830563] ? do_raw_spin_unlock+0xa7/0x330 [ 380.834978] ? do_raw_spin_trylock+0x270/0x270 [ 380.839564] ? __lock_is_held+0xb5/0x140 [ 380.843624] ? __check_object_size+0xb1/0x782 [ 380.848130] ? _raw_spin_unlock+0x2c/0x50 [ 380.852290] ? __alloc_fd+0x347/0x6e0 [ 380.856096] do_filp_open+0x255/0x380 [ 380.859902] ? may_open_dev+0x100/0x100 [ 380.863873] ? strncpy_from_user+0x411/0x5a0 [ 380.868315] ? digsig_verify+0x1530/0x1530 [ 380.872544] ? get_unused_fd_flags+0x122/0x1a0 [ 380.877120] ? getname_flags+0x26e/0x590 [ 380.881199] do_sys_open+0x568/0x700 [ 380.884922] ? filp_open+0x80/0x80 [ 380.888451] ? __ia32_sys_read+0xb0/0xb0 [ 380.892540] ? trace_hardirqs_off_caller+0x300/0x300 [ 380.897664] __x64_sys_openat+0x9d/0x100 [ 380.901734] do_syscall_64+0x1b9/0x820 [ 380.905625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 380.910997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 380.915945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.920794] ? trace_hardirqs_on_caller+0x310/0x310 [ 380.925817] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 380.930838] ? prepare_exit_to_usermode+0x291/0x3b0 [ 380.935876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.940734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.945917] RIP: 0033:0x457569 [ 380.949104] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.968005] RSP: 002b:00007f30c91e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 380.975729] RAX: ffffffffffffffda RBX: 00007f30c91e0c90 RCX: 0000000000457569 [ 380.982999] RDX: 0000000000080240 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 380.990260] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 380.997547] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30c91e16d4 [ 381.004816] R13: 00000000004c2e8a R14: 00000000004d4668 R15: 0000000000000005 03:59:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 03:59:26 executing program 1 (fault-call:2 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:26 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="ff"], 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={@loopback, 0x1f, r3}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=@canfd={{0x0, 0x2, 0x3, 0x8}, 0x2c, 0x3, 0x0, 0x0, "24d265c16f93c0f25aea45213e583a87e3394794563b68749e68ce4345dd49d1c14058497c2510eb367d27ae7a901e35ca2329e58e3873eceb3ae56d766aa260"}, 0x48}, 0x1, 0x0, 0x0, 0x20000081}, 0x20000000) 03:59:26 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x80e, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000140)={0x1000000000}) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0xb3, &(0x7f0000000040)="b9f25c0ae44cd2e966e6c313ee7606666832378a60456996dabd03295202bf2edd08afef2006eb4774d840c58fed03ed97127f7d2633949d3d22a4cf993b2e0a97f4a96da196e659908a63a7b13d41db057cad5f2116e2bb70b27d52846470d91e65154db2d7a93dd9c940a0706b0ab4828393176a66960a6a6bc796b2a1118459ca94520d3a1f6eb5c1c7024eb3d9f93a96f1186d12e0a71ed7e9c3395b15827138bc4c7391ab4457ddf10255d36948b53f3a"}) fadvise64(r0, 0x0, 0xffffffffffffff01, 0x3) 03:59:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x7, @remote}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @local}], 0x2c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x7, 0x6, 0x5, 0x100}, {0x200000000000000, 0x2, 0x8, 0x5}, {0x56, 0x438, 0x7, 0x6}, {0x9, 0x9, 0x4, 0x3}]}) 03:59:26 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="e76465762f736e617073686f7400", 0x80240, 0x0) 03:59:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="81000000000000008b0000000000000000000000000000000000ffffff000001fe80000000000000004092934f3c0c59689eb8bc02fe5c00000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000060000000c011100"], 0x15c}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@loopback, @mcast1, @mcast2, 0x0, 0x9c, 0x1, 0x500, 0xb4, 0x0, r2}) 03:59:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000480)={0x30, 0x5, 0x0, {0x0, 0x1, 0x3}}, 0x30) close(r1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x0, 0x0, 0x1}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000440)={0x335a, 0x40}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) fstatfs(r3, &(0x7f0000000180)=""/51) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0\x00') syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:59:26 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087705, 0x3) 03:59:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/.ev/snapshot\x00', 0x80240, 0x0) 03:59:27 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000400000003b) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x90) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0x37, 0xffff, 0x4fa, "df47f07bbbd09c0273641b0c7e2ab9aaedc3995a1a755e15006633840214aca472301ee3d16c2f955a3e845247c2ad46e448397c7865c1"}) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x1, @random="60d7b527a067"}) 03:59:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:27 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x4, 0x8000) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000140)={0x3, 0x2}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0xa00, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="1be3c9190773477dbcd108897af473c3e69a44b0c093fa8b727ec5cfce7b1aadb0b70069a8a0cad585f70b1f98d2ddda1652e318ad2029cd1504ba0790a9442e36cafef88b748298ab02b3b967bcbf2d197e484bb2ea93b29b2b21681177e6603704005beb9ab8ebcfb316d685bc3221f08bffd0e7d0805b2deb64debc0a4fc680e8c80fef3e181cca8bec316e3280db0ca2e74570375a45a04ee63dc3406a463821f61922fa64e42f0c1f6e9367a806f224f30e3e722eaf46d1066f428eb4dce5fa1b2bb878d9cf199960fe37fdc60a3d03e4f97f4ab71889e161426281188c7d5f3182b09dc1ff", 0xe8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000001c0)={r4, 0x3}) 03:59:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='//ev/snapshot\x00', 0x80240, 0x0) 03:59:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="80d9"], 0xd) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x7f}) 03:59:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:27 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f646576e7736e617073686f7400", 0x80240, 0x0) 03:59:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) recvmmsg(r1, &(0x7f0000004140)=[{{&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f0000000340)=""/225, 0xe1}, {&(0x7f0000000440)=""/217, 0xd9}, {&(0x7f00000001c0)=""/23, 0x17}], 0x4, &(0x7f0000000540)=""/243, 0xf3, 0x7}, 0x29}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000640)=""/126, 0x7e}, {&(0x7f00000006c0)=""/186, 0xba}, {&(0x7f0000000780)=""/144, 0x90}], 0x3, 0x0, 0x0, 0x9}, 0x1f}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/211, 0xd3}, {&(0x7f0000000980)=""/66, 0x42}, {&(0x7f0000000a00)=""/151, 0x97}, {&(0x7f0000000ac0)=""/7, 0x7}, {&(0x7f0000000b00)=""/186, 0xba}, {&(0x7f0000000bc0)=""/41, 0x29}], 0x6, &(0x7f0000001580)=""/4096, 0x1000, 0x400}}, {{&(0x7f0000000d40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000dc0)=""/165, 0xa5}], 0x1, &(0x7f0000001040)=""/217, 0xd9}, 0x4}], 0x4, 0x10102, &(0x7f0000001540)={r2}) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 03:59:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/.napshot\x00', 0x80240, 0x0) 03:59:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:27 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x14000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000280)={r4, 0x9}, 0x8) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) clone(0x0, &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000001700)) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000140)) 03:59:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000240)={0x0, 0x7, 0x6b3, 0x0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) r2 = memfd_create(&(0x7f0000000000)='}\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000002c0)={{0x2, 0x18000}, {0x7ff, 0x1}, 0x7fffffff, 0x1, 0xe2d}) name_to_handle_at(r0, &(0x7f00002e4000)="2e2f66696c65ffff", &(0x7f0000000000)=ANY=[], &(0x7f0000001ffc), 0x1400) 03:59:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev//napshot\x00', 0x80240, 0x0) 03:59:28 executing program 2: mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./control\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f0000000140)) mknod$loop(&(0x7f0000000000)='./control/file0\x00', 0xc102, 0xffffffffffffffff) 03:59:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:28 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:28 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = getpid() wait4(r0, &(0x7f00000002c0), 0x10000000, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x0) linkat(r2, &(0x7f00000005c0)='./bus\x00', r1, &(0x7f0000000640)='./bus\x00', 0x400) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000480)) r4 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000004c0)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000140)=0x14) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000740)=""/194) fcntl$setstatus(r5, 0x4, 0x6100) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000100)={@multicast1, @rand_addr}, &(0x7f0000000380)=0xc) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @loopback}, {0x0, @remote}, 0x72, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000280)={r6, 0x1, 0x6}, 0x10) dup(0xffffffffffffffff) 03:59:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000cc0)=ANY=[@ANYPTR64=&(0x7f00000011c0)=ANY=[@ANYBLOB="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"], @ANYPTR64=&(0x7f0000000c80)=ANY=[@ANYRES16, @ANYRES32]]) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000280)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000071260000000000006706000002000000bf25000000000000620500000e0000007365000000000000bf540000000000000704000004faff003d4301000000000095000000000000005d54090000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf25000000000000070500000e0000001f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) connect$vsock_dgram(r0, &(0x7f00000006c0), 0x10) fchownat(r0, &(0x7f0000000f80)='./file0/file0\x00', r3, r4, 0x0) fstat(r2, &(0x7f00000003c0)) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000700)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getuid() fstat(r2, &(0x7f00000008c0)) geteuid() getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) fstat(r1, &(0x7f0000000a00)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@loopback}}}, &(0x7f0000000c40)=0xe8) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) r5 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0x800, 0x20000000101000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r5, 0xc0505510, &(0x7f0000000540)={0x0, 0x7, 0x7, 0x0, &(0x7f0000000d80)=[{}, {}, {}, {}, {}, {}, {}]}) getegid() fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x2, 0x3, 0x45f, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3, 0x6, 0xb9a, 0x5, 0x0, 0x10001, 0x0, 0x100000000, 0x0, 0x100000001, 0x9, 0x4, 0x0, 0xfff, 0xfffffffffffffff7, 0x5, 0x3, 0x1, 0xb54, 0x7, 0x0, 0x0, 0xfff, 0x80000000, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x90fb}, 0x1038, 0x7, 0x4, 0x0, 0x3, 0x4, 0x85c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:59:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x0, 0x200, 0x1}, 0x20) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x957, 0x3}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x100, 0xfffffffffffffff7}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000800)="260f30d89c2f0001c0feb9e40a0000b8bfb10000ba000000000f3066baa00066b8613a66ef0f017800660f3824f866660f38801d0700000066ba4100b00aee0fc79ac4f9000066baf80cb8d6d6a485ef66bafc0cb00fee"}], 0x305, 0x0, &(0x7f0000000740), 0x1370) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000340)={0x6}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 03:59:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snap.hot\x00', 0x80240, 0x0) 03:59:28 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snap/hot\x00', 0x80240, 0x0) 03:59:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) ioctl$sock_bt(r0, 0xdd1f, &(0x7f0000000000)="b0551a6f3d4c28c62b5a00540ac2cf78feb5f0eaaa482dc6fd182d299b9d3051a79892808351fd612845960b9c04dfaac8d6783b3026d7b503ab3a150df496775945b3894571641f1756e4ea12b923d833036f214a2e4fbfc31ff47972b8fb11f9ca036b7394f6308f00b011a1ea1a5b5bbc0c52ed53457ea08b98796ccd575d8523047129dea09fe1101e9ea775786d59f6977b89a8605e7c78c1e8a55431") connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 03:59:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f74eb", 0x80240, 0x0) 03:59:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:28 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 03:59:29 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = getpid() wait4(r0, &(0x7f00000002c0), 0x10000000, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x0) linkat(r2, &(0x7f00000005c0)='./bus\x00', r1, &(0x7f0000000640)='./bus\x00', 0x400) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000480)) r4 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000004c0)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000140)=0x14) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000740)=""/194) fcntl$setstatus(r5, 0x4, 0x6100) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000100)={@multicast1, @rand_addr}, &(0x7f0000000380)=0xc) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @loopback}, {0x0, @remote}, 0x72, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000280)={r6, 0x1, 0x6}, 0x10) dup(0xffffffffffffffff) 03:59:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f7404", 0x80240, 0x0) 03:59:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000440)='keyring\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x400801) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) 03:59:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:29 executing program 4 (fault-call:7 fault-nth:0): socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 384.247215] syz-executor2 (15124) used greatest stack depth: 12728 bytes left 03:59:29 executing program 0: mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)={0x194, r3, 0x101, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x78, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fffffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3d}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2e36}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x15}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x194}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @local}}, 0x40000000000000, 0x3, 0x80, 0x1, 0x8}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e20, 0x5, @loopback, 0x949c}}, [0x7, 0x9, 0x4, 0x4, 0xd2c0000000000, 0x1ff, 0xa6, 0x8, 0x8000, 0x94, 0x9, 0xb63, 0x0, 0x3f, 0x4]}, &(0x7f00000002c0)=0x100) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="44116c24"], &(0x7f0000000000)=0x2af) close(r4) close(r0) 03:59:29 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') write(r1, &(0x7f00000000c0)="eb72437423debb04689a701b37d68c03b986f4aca2ac66e6604aa40effeac3dc01cdd6cdd96b1683c11c3f05bac74855376ba94eafc79f5c5bd54c07f71f80bc505fb7f1d4dcf6e5c050cf74303b5760e1eb61f9400df3fa8bda65ddebe09fe503860a132007", 0x66) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001280)={r1, &(0x7f00000012c0)="7e29429105c952a50df58d73661d18fc7e86f3c2c01f6d52544743fae0404df3f33f4563bcfc1e219b2f6a07a38a7e251c9d6e74ab3192b19d5f264c824111c1412b8a9f7646252a8cd29b48", &(0x7f0000001340)=""/4096}, 0xfffffe98) getsockopt$inet6_int(r1, 0x29, 0xcc, &(0x7f0000000080), &(0x7f0000000140)=0x4) write$P9_RFLUSH(r1, 0xffffffffffffffff, 0x28e) 03:59:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = userfaultfd(0x0) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 03:59:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:29 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 384.587668] kauditd_printk_skb: 2 callbacks suppressed [ 384.587681] audit: type=1400 audit(1539662369.560:71): apparmor="DENIED" operation="setprocattr" info="fscreate" error=-22 profile="unconfined" pid=15210 comm="syz-executor3" [ 384.688886] audit: type=1400 audit(1539662369.590:72): apparmor="DENIED" operation="setprocattr" info="fscreate" error=-22 profile="unconfined" pid=15210 comm="syz-executor3" 03:59:30 executing program 2: syz_init_net_socket$llc(0x1a, 0x2000000000002, 0x0) r0 = memfd_create(&(0x7f0000000e00)='{ppp1eth1self!user\x00', 0x800000000001) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x200000) r1 = memfd_create(&(0x7f0000000f40)='{ppp1eth1self!user\x00', 0x0) r2 = socket$inet6(0xa, 0x4000007fffd, 0x1f9) ioctl(r2, 0xb64, &(0x7f0000000100)="2957e1311f16f477671070") write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000e40)=0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000000c0)=0xffffffff) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) setreuid(r6, 0x0) 03:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@local, @broadcast, @multicast1}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0xffffffffffffffff}, &(0x7f0000000140)=0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet(0x2, 0xa, 0x36d80) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000200)={0x84, @local, 0x0, 0x0, 'dh\x00', 0x22, 0xffffffffffffffed, 0x1c}, 0x2c) 03:59:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:30 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) r1 = syz_open_dev$sndseq(&(0x7f0000042ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000280)={0x7fffffff, 0x0, 'client0\x00', 0x0, "29ed5b423746a376", "d93182ffaeec7303b8da00"}) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x81) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0xffffffffffff0000, 0x2) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000000)={0x101, 0x7, 0x7fffffff, 0x101, 0x7b8, 0x9}) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) timerfd_gettime(r2, &(0x7f0000000340)) keyctl$instantiate_iov(0x14, r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="80e462a5aafb5f6d2622dcddcfb431285feca7fdaeb0e8696745fa55612a2ab0341924cc6ddf9d6fb2ce4d63ec87be5ed39db9cf45b62b1cbe72324185b53a054e29dc3ce989e8c90d92546298b2d26c4cc8f5a24875793c6d", 0x59}], 0x1, r4) 03:59:30 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000200)={{0x1, 0x4, 0x2, 0x49186628, '\x00', 0x5}, 0x3, 0x30, 0x8, r3, 0x5, 0x4, 'syz0\x00', &(0x7f0000000080)=['/group.stat\x00', '/group.stat\x00', '/group.stat\x00', '/group.stat\x00', '/group.stat\x00'], 0x3c, [], [0x8, 0x3, 0x6, 0x7fff]}) close(r2) [ 385.157666] syz-executor2 (15200) used greatest stack depth: 12712 bytes left 03:59:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:30 executing program 0: r0 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0x29b) recvmmsg(r0, &(0x7f0000006c80)=[{{&(0x7f0000000500)=@un=@abs, 0x80, &(0x7f0000000980)=[{&(0x7f0000000580)=""/186, 0xba}], 0x1, &(0x7f0000000a00)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000006ec0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x40, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000140)}) sendto$inet6(r0, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/121, 0x79}], 0x1, &(0x7f0000000640)=""/190, 0xbe}}], 0x3c8, 0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) sendto$inet6(r0, &(0x7f0000000300)=' ', 0x1, 0x0, 0x0, 0x0) 03:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 385.257378] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b25/0x1d70 [ 385.296957] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b25/0x1d70 03:59:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x14, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r1, &(0x7f00000000c0), &(0x7f000089b000)}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) 03:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:30 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000140)=[0x4c3], 0x1, 0x8, 0xbf2, 0x4, 0x9, 0x79, {0xc17, 0xeda, 0x3, 0x8, 0x6, 0x3, 0x7ce7, 0x4, 0x8000, 0x3, 0x79, 0xb937, 0x4, 0x4, "6b20dc92a83bd8ed370411648672f38614c882157dee101e94d4890ba272ba19"}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8001) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x9, 0x1, {0x0, 0x0, 0x2, 0x0, 0xe97}}) fcntl$setflags(r1, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3, 0xda, 0x0, 0x0, 0x0, 0x6, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 03:59:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f7405", 0x80240, 0x0) 03:59:30 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x248) 03:59:30 executing program 0: syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e22}, {0xa, 0x4e20, 0x0, @mcast2}, 0x0, [0x0, 0x0, 0x100000001, 0x0, 0x9021, 0x0, 0x0, 0x4]}, 0x5c) sync() sendto$llc(0xffffffffffffffff, &(0x7f0000000600)="1450fdb349fa80d85b008c62cce6026fae11ca29fd22a23067e399896a9aab10b3c370e47dc870", 0x27, 0x1, &(0x7f0000000640)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x40, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000780)={0x0, 0x80, 0x3}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000380)={0x3, 0xffffffffffffff9c}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000440)={{0x2, 0x4e24, @loopback}, {0x306}, 0x10, {0x2, 0x4e23, @local}, 'veth1\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) connect$bt_rfcomm(r1, &(0x7f00000003c0)={0x1f, {0x9, 0xffff, 0x3f, 0xffffffffffffff3a, 0x80000001, 0x6}, 0xffffffffffffffd2}, 0xa) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400)=0xa00000000000000, 0x4) connect$netlink(r1, &(0x7f00000004c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x204000}, 0xfffffffffffffe69) 03:59:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sm3\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f0000000080), 0x7ffff00e) 03:59:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f74f6", 0x80240, 0x0) 03:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:30 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x20c282) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 03:59:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x4c, &(0x7f0000000000), 0x0) 03:59:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:31 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80000, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b14af9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1, 0x1000000000000081, 0x0, 0x8000}, 0x0, 0x0, r0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400, 0x0) bind(r2, &(0x7f0000000200)=@rc={0x1f, {0x6, 0x6, 0xffffffff, 0x7, 0x9, 0x3f}, 0x1}, 0x80) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r1, &(0x7f0000000100), 0x4) 03:59:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="ebebbb7eaf12358ae92d03bffa167378fef8fac14b786d169b403a6428fbe5dbfaa738df59"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 03:59:31 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x201, 0x383) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) r3 = dup(r0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x704, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24004800) tkill(r2, 0x401104000000016) 03:59:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:31 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001380)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001480)=0xe8) write$UHID_INPUT(r1, &(0x7f0000001580)={0x8, "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", 0x1000}, 0x1006) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x4, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x1000, 0x1}, {&(0x7f0000001200)="4dafcfe45b00bd24400cda92f88f85d1b30730d33bee3d184acaf91528a13a30d0ee144cd386d521016bccfe5ff3921633c77d16d1a447e462b9e1b5b16bddaeb84696940c6a637b7329fcaf8dfce2f301bc9921a43b8c8ad27600ca82b2479b93cc409eb473c450b9b3dd77639d5ceba0ce0b03b99855346897b4a974c02655deb1f57d810d0ac21c43cc3940217b22f8e8e2f6b6ab0427823bb70045418b7b6ae5186e9d1b20c74b6e342184c3575f45915738359904ca1516025482a0782d34f66a3cb281c5ccbe03c8cb17fa", 0xce, 0xffffffff}, {&(0x7f00000000c0)="257836db2aeffe0b7b4af2a432b175416e4f1d4620264f55ba395613b6fa503e559360cffe21df2fe412cfa3cd9c2330bb7da0e1da7a782ab22d6c3ea82ad5be4d9be929ae1d4a5d9c078e1b85d3dc4b1d250f90d6131dd76570f4be7af06e3b7c85b751f170df3861827b173392", 0x6e, 0xa0a}, {&(0x7f0000000140)="a8139387927f", 0x6, 0xfd6a}], 0x10000, &(0x7f00000014c0)={[{@force='force'}, {@type={'type', 0x3d, "005f1bd4"}}, {@nls={'nls', 0x3d, 'cp1255'}}, {@umask={'umask', 0x3d, 0x6f}}], [{@hash='hash'}, {@appraise='appraise'}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@euid_gt={'euid>', r2}}, {@permit_directio='permit_directio'}]}) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 386.227949] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.256885] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:59:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 386.273652] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 386.322550] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.356824] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.391715] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.421661] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.437229] hfsplus: unable to parse mount options 03:59:31 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x101002, 0x0) r1 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000200662a"], 0x9) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7}, 0x7) r2 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@dev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() r7 = geteuid() getresgid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) r9 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) setxattr$system_posix_acl(&(0x7f00000000c0)='\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {}, [{0x2, 0x2, r2}, {0x2, 0x4, r3}, {0x2, 0x7, r4}, {0x2, 0x2, r5}, {0x2, 0x7, r6}, {0x2, 0x2, r7}], {0x4, 0x2}, [{0x8, 0x1, r8}, {0x8, 0x5, r9}, {0x8, 0x1, r10}, {0x8, 0x7, r11}], {0x10, 0x3}, {0x20, 0x7}}, 0x74, 0x341a71ce1a1effda) sendfile(r0, r1, &(0x7f0000000000), 0x800) 03:59:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(0xffffffffffffffff, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 03:59:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000000)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000300)}, 0x172) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) r1 = getpgid(0x0) sched_setattr(r1, &(0x7f0000000080)={0x30, 0x3, 0x0, 0xffffffffffffff50, 0x10000, 0x4, 0x2, 0x3}, 0x0) [ 386.454538] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.493881] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.544341] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.545153] hfsplus: unable to parse mount options [ 386.575589] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.607567] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 386.633720] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 03:59:31 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x348a, 0x0, 0x7ff00000}]}) 03:59:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x4800, 0x20000102000007) [ 386.684986] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.691733] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.743988] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.797916] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.831270] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.860642] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.880662] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.898383] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.913317] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.927098] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.941981] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 386.969435] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 03:59:32 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in=@rand_addr}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f00000009c0)=0xe8) sendto$inet6(r0, &(0x7f0000000a40), 0x0, 0x0, &(0x7f0000000ac0)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) fremovexattr(r1, &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') 03:59:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) 03:59:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:32 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x3f, {0x2, 0x4e24, @loopback}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}, {0x2, 0x4e23, @broadcast}, 0x208, 0x2588, 0x3c, 0x5, 0x97, &(0x7f0000000040)='ip_vti0\x00', 0x5, 0x6, 0x7}) 03:59:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0xfffffffffffffc00, {{0xa, 0x200000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote, 0x8}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000001c0)=""/209, &(0x7f00000002c0)=0xd1) delete_module(&(0x7f0000000140)='\x00', 0x200) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0xfd23, @remote, 0x400}, 0x1c) 03:59:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timerfd_settime(r1, 0x3, &(0x7f0000000100)={{}, {r2}}, &(0x7f0000000140)) read(r1, &(0x7f0000a16000)=""/71, 0x47) 03:59:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f7402", 0x80240, 0x0) [ 387.333125] IPVS: length: 209 != 24 [ 387.361946] IPVS: length: 209 != 24 03:59:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e13c1365532d9bc1c06429669c3e4a9c9747916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945e488e92c445fbe88d9b84c4982b93de8e0f1ecb30a5a489a112a6aba9851b0cc616eba6ae03202950187f4f3d66961784938317877fa20fc6141cf58eff6a398f41fba606cf3ae96"]]], 0x1}, 0x1, 0x0, 0x0, 0x4004}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0xffffffff7fffffff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000480)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x73, 0x4, 0x8, 0x8e63, 0x1}, &(0x7f0000000540)=0x98) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) clock_gettime(0x0, &(0x7f0000000240)) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "a8d052ab76f5bf5e8548484b4156943c19ece85b"}, 0x15, 0x1) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 03:59:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000002240)={0x1, [0x0]}, &(0x7f0000003a40)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r1, 0x7}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r1, 0x81, 0xffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x14, &(0x7f00000000c0)={r1}, 0x8) 03:59:32 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x10000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200008000f8", 0x16}], 0x0, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESDEC], @ANYRES32, @ANYRES32=0x0]) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0x82307201, &(0x7f00000000c0)) 03:59:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x0) 03:59:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:32 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002340)='/proc/self/net/pfkey\x00', 0x200, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000001cc0)=[{&(0x7f0000000040)={0x27, 0x0, 0x2, 0x7, 0x3f, 0xceb, "3450f6388e1aaf7e1243eb4e61c6bf72901887ef219afc1670d4f1e4b4b1ea3417f58996e916ad29d0b5b0c4ac0763b27c74bc68a768e05dc367eb9dea4b17", 0x24}, 0x60, &(0x7f0000000480)=[{&(0x7f00000000c0)="3d4e8343a6622a816080add00fd6079e0a86e65406da85a80c3c238d799c28a36af0d4d0e492d64a2c9605fceda901c049ad6921054431e18ea84db752935b39f1c4a9bba245bc5bc53bd0f1dc8af9d2a28e2805047dcf8faaf7b58071ba5f4886da428e5f79fcff7693de12444ea74b03f03e", 0x73}, {&(0x7f0000000200)="8381a2b98997fed401bc967831ad33079956adb6f3c3272f7af5f0c8f444b655571acd146fd78637a4f697b103c6109bd029b0f7d27d6c7b562a1aba9f058c72ef0dba596af0404dad49b220036db94f42122f8e393b2f6501fbcb41eea6c2a96c2d9d10e1660ed937d44dab1b060268b5", 0x71}, {&(0x7f0000000140)="fd22543205f068be77ba5bd3ead6159e6c52dc0b0209e852a6b7689dceb1552ba83183cbcf4f351d4eadc413983c1890390e76a66428a21fbb", 0x39}, {&(0x7f0000000280)="5d64e0", 0x3}, {&(0x7f00000002c0)="c6b58a2b2be41f6311316ed5061a663d81ab0ef596c62ab9afe491626c5b57a70a0a4150f8e8f4a0a53d039b9710be93731b019d39ed77f41afda29cbfd04929e5a8a0e1eb407b963fe4ca60736301b0f3cf844e5210af32fd2f02c7c478a89a57d1c0fbe4c44a492a10075e86f49402b1e71ae86913de21430231fc0057e336370aa7424e", 0x85}, {&(0x7f0000000380)="1b27ca6d10fe982f432ed083e0155bf95997dee9e7df7f0cd21569d72d4f9243fc1e19503454477c7d11c101b1b21cf0dbc59fc935c4ddfd97eae43a6fd3b42066757b2dd612235f5d5253cb3e9a5106ade74799fe5db64aa5a0e78066a786f7aea12ce961d33eec1dd12c960ea7ad6635b33532382e000e005b5b1512d737b0b1efed74110a9fdb368a62918fdd61942079d9d6b664dece281e965a0c615bd7810b3ce0dba01acb206c7d7f9e7b2b9b02d0bf631b45e1cd6a", 0xb9}, {&(0x7f0000000440)="2420427dcfa0a5afd9e35e", 0xb}], 0x7, &(0x7f0000000500)={0x28, 0x0, 0x6, "2ff6f6785fee5af58fcdfcbb32b5762e1090701130fa"}, 0x28, 0x24000010}, {&(0x7f0000000540)={0x27, 0x1, 0x1, 0x7, 0x7, 0x5, "2d1d90ede93318264001ef10dc7eeb7ad4731f5c966bdc1980a370777de0d4d2ff505efcc64a9575c70727186eabf706b2c9a5f7d34533e06ddea59c63353c", 0x3}, 0x60, &(0x7f00000016c0)=[{&(0x7f00000005c0)="a89090dab47d6d86dda0dd799df501f3684df79753e999a069144047f1b45b779b0f6d521eccf8d7fc4e7010a1e1d2421a950fe8372fa9c12edd3919670c21ad0f2df40e3c7aca4f0698bd670b50ee7523b6bbd92a277eacb319c47550bd910c84d19d97f0bbb29cec28f0af9a0cd8f355545774cea45c2be0479b812c04857fff692479503a77eff223239197eb36115db6e09969ea26942775e19908917decc8b93a046f040399b32d252a918204dd58ea598b8e48f4aaee8634df41b051ac3de0bdfe91783e6e98272dcdfd7899a4029f04ac023acde523515ac66da4ddf94b0bcf4ea0cfb7c49aa726d652f4fcbb9b2ac956c5e070c6a7c73ad5772fe1c4c2dbd36edc7e2fdc762db5ec87a4af29bcd8d4bfab385d82e1d7f9755886dde17275200d002b16e932ad105e6142e8afbf178c7e131f7daaf4ec2a35af6b16971f182cfacd729f7c764f43ae9494e234d16e8a466107b965a10c45a4aea54f4b2c6d5c5bc0ab8e2632abc866a1391e654a70ef6ec386c95a49535da3e5cc4506f46354b3d0e4b7336291f98a6fa016901fdb9faedbe1c9555186439c6a6ea19af02bdeff2fc3f788f0fff6edd6e86d1d0694daa682eea37ec54f30f6eaf59d49bf2655d5459a6d14ec6c55d485f189340a01a6cc4a9c4afd80f85043fcf46f1203f0f9fa3bd0378917d9c889d6fe14ef294539835a518e444487360d431f8e52a10cb77411825702df8a654e675323979c17cb69c10a9cc0ca5f60cd13c8a59e3a9956bf3a7fac7ddf7842d68fd9294d58f055f4df007b75e5f9f8a6d4284a10c72dc28485c6e923a1c7325d161d49bb33834d68db495f13163b0b794dbfb88bc461493fc3ce8d96067f86e29ab098b8992304af455a4bf83a73f3b91afcb1ba75b8c20d3abb5dc6a8b963ff84b70e609c044c8ce379a6e5109caa6096904e25bd13e9dc29a631cfed0eee4fed58e4c451ac040927ae6faba2b57446aa68f4f1efa42bca61348b90a7b5feca03c2e9f39e169b2479a1c64d5c87ee81d90b70889d2e7af706c28c3d20a389e82f3305ccc8e48a62e562645efef972d01a54eadca8644aa8875deb42726ab1c88f47fde73dfb9746bd052c4688146aa7feb80061775a165de2007834e7f72d5d45ad6ca83e3f4558fa0765cfcf393eaf7a6dd27459273ff5c496c5151c0bd04a9bd1e4e63b91848864f68c90eadc9ca98df7e20c9706f22ae70b25d540cb28931dfde975639821f57721516f6efff5de6877910b2db93004da5b437ea54bd254fc03ac70d10236d62db86652b2d2ef136a9b4f2e78c8ff19fe82f51d34544a3ff479c51f94485a4ae4e20bd3dc32b39df43ca41031ad08c5b4b6d4a2566a1c157fc9ce3e61de12ee502b8ed5e30559e39748c9dd57f2ca6b0930d429de55125d22f09b8f643ddd56d8cf17ddc36440f457d0cdf6f7a7e4ba25dcea555df4e649b88872f170820bcc972adcb091a2619cbd2d91bc0e92d0dce12a1919b3dde9ef9888ed0a621e2661f92dfdf82c383a2a51b4bf7098373a812931907ca897c315ae8f5cfcb992ab994752db0a9d531813692a2486f2f206950abcf86c1b502b03fdb08e7e236370b43483cbef34a1993b5bc39b240fba585b74239f31e7b0d685b792c5e9fc82ae100456d028779ef2a67d4614749e9486bc9c16dc0819e4300531b45782b2c531db625d960c5840cd98fead058981de871e187279115362154d4d8df43d33355c4d2000af0f1549243712318343f624ec4daaaef1378f4704de9ba5a965e2a37fade4af15e5c589b5a9ee701659a34d1a07fc0a9f04ecb1b32d4d3c951ea2fcb10b6894878d0bd23a91b1ad7962959b4d6d0122ba8366906d645ea6202fd3a9b6497da77875a0a15ec2fa08118b39dd152c23856a1e9bb6216a5d57818854239a1fe38d8f8f751b68dd69986c0560043b32f732954e744e1ba85a671161818939c39a3702808085f72abcfd1206d83ac052b4adb8b3e661fedfe9c86bda6354135363daf36e6b256051f28a061f113b7872a7c96ced3448e88d77612c4f06221cebb228a7c6e4b68ebdfc13c0ee89a5ef19e68733d7d881d3eb95e8236822a2d3fe3f6ae1e81148417ec5de9921f7643a37a9647e545ae79e203bbfa155452dfa19061101a40a7e5b6f79ead4212ee1bc7d30dacc4a3910c8a922b490aaa1fd97fee907dd7c379f4ea769f14cc7ccaac266c13d36def727e8ba5a80ebdb41a88a9e988ff79e88bf7404ac288477229d14c07952d157cbb2ff81b3969875c91633edfc3a632d82dcaa793b2b4e783038ddc0fccee3ed835b652166dc8adc886cd0d25dd3e327f1d5ead9d5ec231ff451651aeeb450b55d69758fb2aa077524ff9bba7fb2a5e5ec218b5094a93804129ed63c84f4569b052e3a0ee04f86c0b1bcd5c0c582d309414d5b52b79be81e420db827a7ab94c21710ba8b6e8b91e452fa59249db277677871bd2faf310c32237bfe4822de9bc898e8cdf8108bc795a4a6743f8d7a8df6f24c8d1b664f343fe9ccea9630e2191a893a848c23d16d87e760bc1fdbc6e6258a07a8c757273e1188291bb071631930de4ded9b355e2f80fd28f7e266704c4c281c5efbebdec3e2ff2df6354d8ac787e68d9d0faa568d661aa14bf96f8f3796e0805ceef1c9ef3cc2e31d2ff89c3f4fdf3509f8b5d049f075e2444555845beec0beed17cee03e1f78d5d9d1f5185649b75e3a497ff51bf7c9ab9be3c1662af157bc2c6f98c3354153392cbe3fead0419b0d8be9a815328d27acbdbaca1483cbb76e0ca4a74c54e7c4ecefccf25ad148585df5b6b9c9fd69a77bd1535eaa2b15480e3a768981926a1e124d0ed155655ec97750a6f71b0b708636ce6222154d07eef939c08216aad9d11c181b09fa68c13edbd9057d929f3b6205b79dbed8a9fed117f8819fe4bff62cd779a3a70e9ebea75df23daf7a9061b45c275b1b524b2b7920cbb379ce8027e43860a146e5c5a633c63c9aba8c330910f947fc474e2ed10541fc16fa7f77bb48d71e7bd33cd970a7a92a7ea2827491395ae20737d51876ee2ddd73ea0198169b374906838c625316a8784897babb7fc803737261edb6df082c63e771046d3d94dd6b153592bdf5a3573edf053138ff58862729f8a317531d4686c614f68e62c6056db988ad0206271d8f72803229dc5394bf4d9fd682c21e4236caa2dde9f1bb0d95bf07ae60897ebd9eec2091f6b66ab9ccccc0773b517f55c8e44f301f1d0e5d72535678b1523528081a0f09d75b96a7ddde9edd03a90f9a2d91a165b1e1481a2d5f48539bc00e8ba3660c31c812f086fb17551e76162f648da26fbcacb3dcb3a44a3ab71be4134718db3e416424cd5977ee1bd4dbb8f3c1e2a3e9efcc1dd5fa9077de6069b70c8ace20e767065f1c05f6fa42ba6164774f7181a6e093fdba550b536b5106f7c3dbc912d11982963e9319b077cfd88b6f75a364265a9dbbadbe39c0fc28749d6ca53c0d3dff6a88dee0d6daa46d299e76ff4630a8f56dfbe276b620c537f2f688273f3c975ee703450a4bc23de49cc2c515345e52bf51a2b22d65b465f61f3a21588cb6c0bed4b29d56f1572632a0b746ab2d36b056d249f096780cb791b8d65f0b3f70f981bd47cacc173c67d94468c141cdaf6663f09b488574d0396f255b070450e75a9fcf595d196e8b097468e3cf49022de79f9ce7243d94cc6cba7c408d800b84bd7a2c33e9ab15c65f87be09dd4d079bf2e91b3641e67480e883961994ccc75f36882a2e238d974e50885f3acf040b6e04a75e333696a89e08e07808c26a8d20fc37424859e2b026a6b77c80178f8e43e1514167ce9f3460953c750b51ab0f5ef15a64adb5f4ba800e2bfa7ade68bc368db4bab35ffd5baa177eded048a07ee9b21d86a655c57eeef6deaee124669a293e3074823a8f10ce4ea037b26a3d5dcb180e3e1aa5259fc7a21cd527668440fdba2dfb698f086b27eae427430f848a3367e8552ad018bf71afcee4d61de6d2536787e4834d37869fe969e06c8651b44ee19040443007d314a6bb32449e3dcff3c543908a67f3d9753a69fde7a16d3623bede5506a0f10a5543a70cfc9655645bb4dc973b905bff6b3f10daf332e56716a4ca45b1dd1ec5125deb2ca5b3c25e68c5e76a734950ecdfa2eb486ec6736b18a0ccba4eb932adfdbc7ff7a86d4f0cfcdda8eb1efbfd2ceaddc19c90c7306bcd8545750fc0458d4f3570f568cc334ff94ebd7739a7456c99e178e20604ad88a49e9314d7b856f79e6478e25520b92225ca451a41fb6119e93ffcd572bcee796b43c0c6b315543f889d262ba6280ea28326b6c9ecd8dee69cef17b941cda2927dfc25b5da4966e3109414829d4355b43328d4e438a1863885a9a2c56dfd5c2269b14e8b2a8e98f9c383862ca581baaf070d3332f27196bc380ac5f6539d2af48fb199f52de1584bffa7da214492cea4e6799128469d19fec1e7fc7e6b07d5c65edd72246207a798664583799b35ff95ce7a95668d3751eefe82834734a904a9b8079441c78cb7dcf5540acf18b7c8a053b73cb3de8c4efe19b738c0842878d3ca760adcd4ca11c38b729bca79dececb5eb7a07bb7f534c675d2cb8a89359393858178ec9bc63f94bc2140b2b20b0f1b8d4cfcc74a6d60f4007edd81a5c0adda1f5c0c8e7323ac87bfa1bc7ced014b315abd842894524ab5d4c513327d52376d93de8a637fe0925ff5c7ea9198aa89d91f32b7d915d7a511fa8f72e5ca3ec23f6650af7b3afe1f752e635783ead39886609926d1c5b99f674864ba3996e3de86c8154c4dd718115d5e55e0ed5cd7dd28afbcac0385364c8035e3cf1e30c81c020bcecfbbf95e5c8aad90cbd39c52d9292de5c1f571998d4781d026efffecea4e775ebad996950a6694bab4c7e57278f76ffc981fa8ba652d175e51f17085edeb5f310c4354d097a342c1c43556da8dd488a70e456c30c97d029c4c8ffd5f45e57028fc5159d5ba472360ff703d4b93fc596deceb35ebb31f36a76aaf78267627bb5a064b807c1a5db0807585eff4cdaab7c7472a8970509765803d4d441d6c19b79f3393e8dadf99ea45ba7cffb1a130bb5056c40bc54c2c406da9f09545332e77b3468f916bcf43757372c8058461e809ac6af0779b1808b42b39ca40d84d04c9215fd9e61af827046f906161a58562ad7edf3826b6fead4d750f22bbff695a25d572864cec195d1549656d62867d502ae0b3085d7f97e233505539d1f97443da7b70ec840a9351ca08fdcc71ba9cf15bab90ad4b2c5143705ab00765106608a808f2c600010564d5f17f95833f29d365f05a53e06dce588a3f402f3c2ba1ebb1facb714d14c830c28615e8c5fdf5135f058e8a89aac3b9c9a6a7331a42f54c04edaeb478edc7a8734176826740c6c9dff80de5d7cf7b3415e940faae68c89721c1a41cf59b34db09014bb62b12e9cad1571bea891da0556cb5cf44b2934527b2343cf18b4a59084d81205cfba561c17a747a90fcf160d0c253f41789b35e8045153add142322d7a971a826cb8c0aa7c14e49f42c31cfcdec18a10db39912184038e15e19b916f3743707a7cd44d9898dddae875ef1fd13ec882f30ab25c5e4a1da5ced077cf5c6458ad33f0c697fd5dd014c36a62371dbb6854193af4f406406a8f968c65d89b09851480ddf423916c5550b77fc4d813b48a510b05ea04135a235ac53b23df87ce95612dc821654ced173f03d0adb5b4a01e97515d5af4b6c711adf241f931058747e6e8da5933964499d0d566f", 0x1000}, {&(0x7f00000015c0)="07c532e608552c25faec3b62b56e72bef6da1f96d53c3c503e3007104dbe1837785690481670f85af3cda974bf4464c3b66c260d9046909e949f2072dd3e6a90b0b831988272cd1d1b80bffa0d164f115038d8e40b565d16488d40c44e64ba8758e7beec4438a5c146f4e132ce0bcaba12a794a1bf55cacd6997fced2365e557601e289ded0073503cd36c3ff22d3573875e5034b50c0dcf900bcbd3881f84a9f17f541318596d49f73dda33519f4b754b46e7a33934b1ede3e6e11f1fc40ad725a773030d499d5feb37dc586416aa9785ae127337dbf06c16553d09d3491f", 0xdf}], 0x2, 0x0, 0x0, 0xe26038e40a7403c4}, {&(0x7f0000001700)={0x27, 0x0, 0x1, 0x7, 0x60000000000, 0x8, "630d587542f0d0865ab62631299116543f1cd083c7fdfd36095bc27628ed4a0aa1552416efdbbd8d3e56450b8457608158321e83fd2e6a5e9f404f8593948b", 0x26}, 0x60, &(0x7f0000001a40)=[{&(0x7f0000001780)="3bac16286597c9884a65fa9133874cd4ee7ed7eca9355f8240c388a49ee9ff2e03761861de6b4f6e60366fe2eb4634047c7d02a68888387d6e33d9817b24424fc1edc5b664693152fe", 0x49}, {&(0x7f0000001800)="75dae7138c52e4cbe9e0f6aaf72e1a9aa6209f22012f9741310664206c378eed549a3d4b4df226c544fad835b87f0e2d4f4048e6d22a3d9abe3a4a622a961fb4debd98fdbf914672424585c80f65b69f7e9c4d55cc363097790597b87ae4ab9492643610d6a74f106a8e88db216fd2fa326517d722603779b3605a", 0x7b}, {&(0x7f0000001880)="96e137b9566767ccc6c2a8f159c800b05410138b721745f9603b47ab307f60f0c433a313069177f6713fa678c62fdb71add9eb45d389eadc319899c2767b84eea3030d43ed066f3698518b1b063c47413f1a2708c388242daedffcf6f478b9b81919edb45af788f644c2d69eafb43217a396ef7b8dc4a2101c221865c7a20d1eeb0a19fd96106cdc6e84", 0x8a}, {&(0x7f0000001940)="81634e309f6081314529d4df25903844b0324f16d887ea5845e34823797300122fdb7fde228e14ef0719b68923b2685fbd8c199d37ca3d41bb370efeaadab16880d6b1f470e994caa6cc509d1245cb640a7101e40ab396f6bb9fc3730bcbcaa5e22ec52a9238cb99e8fdb98e3030895293b2471646fd3faeb4360e9813d218", 0x7f}, {&(0x7f00000019c0)="3638a8556e9547d37d2104cb7b3a79f3cdefe4f4ea82cc478f3cc0af8e495ea6b3ee7a1a7285a7388ff8396bf8e99db18e9632ad89526f6b581895a6f237b96c5575feba34741797858bd86e5c9fcd3a44774976ea7feb766f374f34210de3537646587033bfde4fe9789df5f521ade39d", 0x71}], 0x5, 0x0, 0x0, 0x90}, {&(0x7f0000001ac0)={0x27, 0x1, 0x0, 0x3, 0x18d, 0x5, "c401c1895aefba8574bbf4b4c286195bbcfcaa02e4c26f73664b62ca69c3186c841b5d12abeae6cef0659a185b0c8c03a8fcc562130c0466789c2d6a4ad0a7", 0x2f}, 0x60, &(0x7f0000001c80)=[{&(0x7f0000001b40)="2b53b8f7ea3605a5122feb111abcb27f2d7517e7da247fd32a08bf0b12c1746687452681df74a8564e1c7aa09a90ea1765ed6b54d919f0644950434adea96c6d80423f4f037826b5c64647c442514881df50825c4f87a063c7f3d30a0c8488c998c46175d0a3d1cbf500cce8440236acb7109bdce35d4733c9c8249f7e8f558bd5e802c4e5d7aa7ffb65a1", 0x8b}, {&(0x7f0000001c00)="aae96b76c437d4c1281f15bb24fc1f90766088aac8ecfc8b", 0x18}, {&(0x7f0000001c40)="31f48e9d24e2536991fab60755d491ee21b7410c2678076cea357a4d73e1bd804f68743e8dd5e1681c7ea25201bf80a09377", 0x32}], 0x3, &(0x7f00000023c0)=ANY=[@ANYBLOB="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"], 0x1010, 0x4040}], 0x4, 0x44) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000002380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RATTACH(r1, &(0x7f0000001dc0)={0x14, 0x69, 0x1, {0x80, 0x1, 0x6}}, 0x14) write$P9_RUNLINKAT(r1, &(0x7f0000001e00)={0x7, 0x4d, 0x1}, 0x7) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001e80)='selinuxnodev)md5sum\'-wlan0&\x00') ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000001e40)) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 03:59:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x0) 03:59:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x7, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f00000002c0)=0x8) ppoll(&(0x7f0000000040)=[{r0, 0x4606}, {r0, 0x40}, {r0, 0x1}, {r0}, {r0}, {r0, 0x200}], 0x6, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)={0x80000001}, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000140)={0x80000001, 0x0, 'client0\x00', 0x2, "2bb8707c667145ed", "38b560b9612cd581d8862f46891d00ab7152e139687ccec8fedd80471adcf592", 0x8, 0xfffffffffffff839}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x8031, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)="19febfbad5bdbbeab4d71b6366a6c99d7d6f4d7ed17b27a14b5951db747ec636d1d4d4783cd720f03229dcb7ed70ceb89f9070422f9cfdedb08a40d2e3fb661d68e8941e1534ae4e71e09ca22bb17f6a2f56ffaed895dc6ffcdbc69bd5cf4cb8d66e700bb47d3879aa8244365e52bbd04e8cffc497da43b816fac409", 0x7c, 0x7fffffff}, {&(0x7f0000000380)="c8c84ae6752a480bfb6399d0e4a1f6b26c742fba891f4a8cb4ca23218561a3d00ed9cb71b10b623b943d9a76de01b2af50f3dacb54c369a8b19154304708ea8fb1c0311e39276c6b234c440ecadc3ac4f734cba448b8d5e9e70a0c8ae8bfa6e9631812cec26dea107bb538a484ab9ea5438581f0db0f3be487c9e285fe74b6dfef38c807aef971a9758afe826ff37851c4", 0x91, 0x9}]) setsockopt$inet_dccp_int(r4, 0x21, 0xb, &(0x7f0000000200)=0x43, 0x4) 03:59:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e13c1365532d9bc1c06429669c3e4a9c9747916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945e488e92c445fbe88d9b84c4982b93de8e0f1ecb30a5a489a112a6aba9851b0cc616eba6ae03202950187f4f3d66961784938317877fa20fc6141cf58eff6a398f41fba606cf3ae96"]]], 0x1}, 0x1, 0x0, 0x0, 0x4004}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0xffffffff7fffffff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000480)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x73, 0x4, 0x8, 0x8e63, 0x1}, &(0x7f0000000540)=0x98) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) clock_gettime(0x0, &(0x7f0000000240)) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "a8d052ab76f5bf5e8548484b4156943c19ece85b"}, 0x15, 0x1) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 03:59:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f74ff", 0x80240, 0x0) [ 387.946874] Unknown ioctl -1061399727 03:59:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x0) 03:59:33 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) close(r1) [ 388.160953] Unknown ioctl -1061399727 03:59:33 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x10000) r3 = gettid() fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1, 0x3, 0xfffffffffffffffb, 0x3, r3}) ioctl$RTC_ALM_READ(r0, 0x80247009, &(0x7f0000000080)) 03:59:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f74ff", 0x80240, 0x0) 03:59:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="a693f9714864fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e13c1365532d9bc1c06429669c3e4a9c9747916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945e488e92c445fbe88d9b84c4982b93de8e0f1ecb30a5a489a112a6aba9851b0cc616eba6ae03202950187f4f3d66961784938317877fa20fc6141cf58eff6a398f41fba606cf3ae96"]]], 0x1}, 0x1, 0x0, 0x0, 0x4004}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0xffffffff7fffffff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000480)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x73, 0x4, 0x8, 0x8e63, 0x1}, &(0x7f0000000540)=0x98) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty, [0x0, 0x3e8]}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) clock_gettime(0x0, &(0x7f0000000240)) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "a8d052ab76f5bf5e8548484b4156943c19ece85b"}, 0x15, 0x1) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000300), 0x8) 03:59:33 executing program 5 (fault-call:6 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) 03:59:33 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f62340300d25d766070") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10180, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x1012, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="f7"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 388.438613] FAULT_INJECTION: forcing a failure. [ 388.438613] name failslab, interval 1, probability 0, space 0, times 0 [ 388.495665] CPU: 0 PID: 15493 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 388.504208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.513576] Call Trace: [ 388.516194] dump_stack+0x244/0x39d [ 388.519852] ? dump_stack_print_info.cold.1+0x20/0x20 [ 388.525071] ? debug_smp_processor_id+0x1c/0x20 [ 388.529788] ? perf_trace_lock+0x14d/0x7a0 [ 388.534050] should_fail.cold.4+0xa/0x17 [ 388.538135] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 388.543264] ? lock_is_held_type+0x210/0x210 [ 388.547728] ? find_held_lock+0x36/0x1c0 [ 388.551834] ? aa_file_perm+0x469/0x1060 [ 388.555922] ? find_held_lock+0x36/0x1c0 [ 388.560028] ? perf_trace_sched_process_exec+0x860/0x860 [ 388.565513] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 388.570993] __should_failslab+0x124/0x180 [ 388.575248] should_failslab+0x9/0x14 [ 388.579072] kmem_cache_alloc_trace+0x2d7/0x750 [ 388.583764] ? aa_file_perm+0x490/0x1060 [ 388.587851] ? rcu_softirq_qs+0x20/0x20 [ 388.591854] alloc_pipe_info+0x164/0x5d0 03:59:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 388.595929] ? aa_path_link+0x5e0/0x5e0 [ 388.599925] ? pipe_read+0x940/0x940 [ 388.603673] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 388.608621] ? common_file_perm+0x236/0x7f0 [ 388.612958] ? perf_trace_lock+0x14d/0x7a0 [ 388.617211] ? find_held_lock+0x36/0x1c0 [ 388.621385] splice_direct_to_actor+0x6fc/0x8f0 [ 388.626079] ? pipe_to_sendpage+0x400/0x400 [ 388.630442] ? apparmor_file_permission+0x24/0x30 [ 388.635301] ? do_splice_to+0x190/0x190 [ 388.639296] ? security_file_permission+0x1c2/0x220 [ 388.644333] ? rw_verify_area+0x118/0x360 [ 388.648502] do_splice_direct+0x2d4/0x420 [ 388.652675] ? splice_direct_to_actor+0x8f0/0x8f0 [ 388.657541] ? apparmor_file_permission+0x24/0x30 [ 388.662414] ? rw_verify_area+0x118/0x360 [ 388.666600] do_sendfile+0x62a/0xe20 [ 388.670394] ? do_compat_pwritev64+0x1c0/0x1c0 [ 388.675017] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.680574] ? _copy_from_user+0xdf/0x150 [ 388.684747] __x64_sys_sendfile64+0x15d/0x250 [ 388.689279] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 388.693892] do_syscall_64+0x1b9/0x820 [ 388.697802] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 388.703187] ? syscall_return_slowpath+0x5e0/0x5e0 [ 388.708129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.712995] ? trace_hardirqs_on_caller+0x310/0x310 [ 388.718027] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 388.723057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 388.728093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.728135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.728148] RIP: 0033:0x457569 [ 388.728189] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.728208] RSP: 002b:00007fb58627fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 388.728234] RAX: ffffffffffffffda RBX: 00007fb58627fc90 RCX: 0000000000457569 [ 388.728253] RDX: 0000000020000240 RSI: 0000000000000006 RDI: 0000000000000003 [ 388.728273] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 03:59:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1, 0x4674}, &(0x7f0000000180)=0x8) close(r0) 03:59:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 388.728293] R10: 0020000102000007 R11: 0000000000000246 R12: 00007fb5862806d4 [ 388.728301] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000007 03:59:33 executing program 0: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40802, 0x0) acct(&(0x7f0000000140)='./file0/file0\x00') write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000200)={0x49, 0x75, 0x1, {0x3e, "4a42d6a74bd560f471df53ea658a80c30735e695ca2f283b5198347e63c182cb61a105dc8eb3225db13831f318587746467966f6e3b3a0643ae9d3a7ff0a"}}, 0x49) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) write$P9_RREAD(r0, &(0x7f0000000380)={0x59, 0x75, 0x1, {0x4e, "89d305ba705a8adbf615418d4f2eaafcd8173f951a14c788ec288826d622ba8b3416340eab47776828765529a1d52485e1a7f14097f8ea98ee4a8c0f9a074e8bfc011271697ef15223e244dc0873"}}, 0x59) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000480)={0x2}, 0x4) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$rds(r0, &(0x7f0000000440)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x8000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) lstat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000500)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000008000)=ANY=[@ANYBLOB="05000000040000000000000000000000000000000000000201000000"], 0x1c}}, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000280)={'TPROXY\x00'}, &(0x7f0000000400)=0x1e) write$binfmt_misc(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="164e9096ce016540627accafc3d41db9c916981893d5440ab73545e08303ad6c318837d35f2292a9798689962087eed30150286b08082d6b4c39248ed584992e1d80519d2cdbb81325cb69427160055ecabbdd738d10642a99a3ab75f00c13957af67f309b6af3cc00df5f98fcdfec2e266edde059804973710387b8e3c6b4fd0715d1c9aee90b13035813357bff93ce545186ae7817880c3433c69215"], 0x9d) 03:59:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:34 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x8003, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000540)={0x0, 0x0, 0x2, 0x0, [], [{0xfff, 0x5, 0x6, 0x7f, 0x8, 0x3}, {0x8, 0x0, 0xe0a1, 0x3918a4cf, 0x1, 0xa0}], [[], []]}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000400)=""/95) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000300, 0x0, 0x4000000000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="000000001b5ebebb447030aeb22945e167342939f549033780d617de4264fecab44536c1c80b5b56006fbd2eb634aee28626881d8aff06b55a90850b1f73a54bdd5cf990ab6891e587022b3198f2cd6baa9116967b1b2118abc80430c05e30838d492c39b165b27eedbbf142874d9a1f35bbab5103fbb081b11eedd6e0ef28b42e5b637751"], &(0x7f0000000280)=0x1) socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_stream(0x28, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef]}}) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000003c0)={0x0, 0x0, 0x2, [0xb4, 0x6af3b431, 0x66db]}, 0xffffffffffffff51) ioctl$LOOP_CLR_FD(r3, 0x4c01) open(&(0x7f0000000200)='./file0\x00', 0x4200, 0x6) 03:59:34 executing program 5 (fault-call:6 fault-nth:1): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) 03:59:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:34 executing program 2: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000001240)={[{@statfs_percent={'statfs_percent', 0x3d, 0x100000000}}]}) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='nev/psched\x00') setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)=0x1, 0x4) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) [ 389.202582] FAULT_INJECTION: forcing a failure. [ 389.202582] name failslab, interval 1, probability 0, space 0, times 0 [ 389.290012] CPU: 0 PID: 15542 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 389.298562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.307936] Call Trace: [ 389.310553] dump_stack+0x244/0x39d [ 389.314217] ? dump_stack_print_info.cold.1+0x20/0x20 [ 389.319438] ? debug_smp_processor_id+0x1c/0x20 [ 389.324131] ? perf_trace_lock+0x14d/0x7a0 [ 389.328397] should_fail.cold.4+0xa/0x17 [ 389.332482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 389.337616] ? save_stack+0x43/0xd0 [ 389.341261] ? kasan_kmalloc+0xc7/0xe0 [ 389.345169] ? kmem_cache_alloc_trace+0x152/0x750 [ 389.350063] ? alloc_pipe_info+0x164/0x5d0 [ 389.354318] ? splice_direct_to_actor+0x6fc/0x8f0 [ 389.359181] ? do_sendfile+0x62a/0xe20 [ 389.363092] ? __x64_sys_sendfile64+0x15d/0x250 [ 389.367796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.373194] ? find_held_lock+0x36/0x1c0 [ 389.377306] ? perf_trace_sched_process_exec+0x860/0x860 [ 389.382789] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 389.388358] __should_failslab+0x124/0x180 [ 389.388378] should_failslab+0x9/0x14 [ 389.388395] __kmalloc+0x2e0/0x760 [ 389.388413] ? kmem_cache_alloc_trace+0x353/0x750 [ 389.388429] ? aa_file_perm+0x490/0x1060 [ 389.388448] ? rcu_softirq_qs+0x20/0x20 [ 389.388466] ? alloc_pipe_info+0x2ce/0x5d0 [ 389.388491] alloc_pipe_info+0x2ce/0x5d0 [ 389.388512] ? pipe_read+0x940/0x940 [ 389.388544] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 389.430141] ? common_file_perm+0x236/0x7f0 [ 389.434487] ? perf_trace_lock+0x14d/0x7a0 [ 389.438741] ? find_held_lock+0x36/0x1c0 [ 389.442837] splice_direct_to_actor+0x6fc/0x8f0 [ 389.447529] ? pipe_to_sendpage+0x400/0x400 [ 389.451877] ? apparmor_file_permission+0x24/0x30 [ 389.456741] ? do_splice_to+0x190/0x190 [ 389.460759] ? security_file_permission+0x1c2/0x220 [ 389.465816] ? rw_verify_area+0x118/0x360 [ 389.469992] do_splice_direct+0x2d4/0x420 [ 389.474167] ? splice_direct_to_actor+0x8f0/0x8f0 [ 389.479028] ? apparmor_file_permission+0x24/0x30 [ 389.483900] ? rw_verify_area+0x118/0x360 [ 389.488079] do_sendfile+0x62a/0xe20 [ 389.491836] ? do_compat_pwritev64+0x1c0/0x1c0 [ 389.496449] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.502003] ? _copy_from_user+0xdf/0x150 [ 389.502029] __x64_sys_sendfile64+0x15d/0x250 [ 389.502052] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 389.502086] do_syscall_64+0x1b9/0x820 [ 389.502107] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 389.502127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 389.502148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.534396] ? trace_hardirqs_on_caller+0x310/0x310 [ 389.539456] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 389.544508] ? prepare_exit_to_usermode+0x291/0x3b0 [ 389.549552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.554438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.559644] RIP: 0033:0x457569 [ 389.562861] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.581774] RSP: 002b:00007fb58627fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 389.581797] RAX: ffffffffffffffda RBX: 00007fb58627fc90 RCX: 0000000000457569 [ 389.581808] RDX: 0000000020000240 RSI: 0000000000000006 RDI: 0000000000000003 [ 389.581818] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 389.581828] R10: 0020000102000007 R11: 0000000000000246 R12: 00007fb5862806d4 [ 389.581839] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000007 [ 389.696418] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 03:59:34 executing program 5 (fault-call:6 fault-nth:2): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) [ 389.790186] FAULT_INJECTION: forcing a failure. [ 389.790186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 389.794106] gfs2: can't parse mount arguments 03:59:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 389.837723] CPU: 1 PID: 15567 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 389.846297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.855673] Call Trace: [ 389.858303] dump_stack+0x244/0x39d [ 389.861968] ? dump_stack_print_info.cold.1+0x20/0x20 [ 389.867181] ? perf_trace_lock+0x14d/0x7a0 [ 389.867216] should_fail.cold.4+0xa/0x17 [ 389.867242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 389.875543] ? zap_class+0x640/0x640 [ 389.875574] ? __lock_is_held+0xb5/0x140 [ 389.875599] ? find_held_lock+0x36/0x1c0 [ 389.875703] ? r5l_start.cold.39+0x23a/0x179a [ 389.875736] ? lock_release+0xa10/0xa10 [ 389.901134] ? perf_trace_sched_process_exec+0x860/0x860 [ 389.906610] ? rcu_softirq_qs+0x20/0x20 [ 389.910613] ? __might_sleep+0x95/0x190 [ 389.914616] __alloc_pages_nodemask+0x34b/0xdd0 [ 389.919319] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 389.924361] ? __update_load_avg_blocked_se+0x690/0x690 [ 389.929762] ? __update_load_avg_se+0xae0/0xae0 [ 389.934458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.940012] ? check_preemption_disabled+0x48/0x280 [ 389.945056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.950602] ? percpu_counter_add_batch+0x141/0x190 [ 389.955639] ? mpol_shared_policy_lookup+0xf7/0x150 [ 389.960675] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 389.966226] alloc_pages_vma+0x11e/0x4a0 [ 389.970361] shmem_alloc_page+0xa5/0x190 [ 389.974449] ? shmem_swapin+0x230/0x230 [ 389.978483] shmem_alloc_and_acct_page+0x248/0xdb0 [ 389.983437] ? shmem_getattr+0x2c0/0x2c0 [ 389.987535] ? lock_unpin_lock+0x4a0/0x4a0 [ 389.991787] ? lock_unpin_lock+0x4a0/0x4a0 [ 389.996050] ? print_usage_bug+0xc0/0xc0 [ 390.000140] ? print_usage_bug+0xc0/0xc0 [ 390.004231] ? __lock_acquire+0x62f/0x4c20 [ 390.008486] ? zap_class+0x640/0x640 [ 390.012210] ? __lock_is_held+0xb5/0x140 [ 390.016288] ? print_usage_bug+0xc0/0xc0 [ 390.020369] shmem_getpage_gfp+0x71d/0x4840 [ 390.024698] ? __lock_is_held+0xb5/0x140 [ 390.028800] ? shmem_add_to_page_cache+0x1950/0x1950 [ 390.033912] ? print_usage_bug+0xc0/0xc0 [ 390.037979] ? check_preemption_disabled+0x48/0x280 [ 390.043004] ? check_preemption_disabled+0x48/0x280 [ 390.048036] ? mark_held_locks+0x130/0x130 [ 390.052285] ? debug_smp_processor_id+0x1c/0x20 [ 390.056960] ? perf_trace_lock+0x14d/0x7a0 [ 390.061200] ? lock_is_held_type+0x210/0x210 [ 390.065628] ? __lock_acquire+0x62f/0x4c20 [ 390.069870] ? check_preemption_disabled+0x48/0x280 [ 390.074898] ? debug_smp_processor_id+0x1c/0x20 [ 390.079571] ? perf_trace_lock+0x14d/0x7a0 [ 390.083821] ? print_usage_bug+0xc0/0xc0 [ 390.087892] ? mark_held_locks+0x130/0x130 [ 390.092138] ? print_usage_bug+0xc0/0xc0 [ 390.096214] ? zap_class+0x640/0x640 [ 390.099931] ? find_held_lock+0x36/0x1c0 [ 390.103996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.109550] ? __lock_acquire+0x62f/0x4c20 [ 390.113800] ? __lock_acquire+0x62f/0x4c20 [ 390.118049] ? print_usage_bug+0xc0/0xc0 [ 390.122123] ? mark_held_locks+0x130/0x130 [ 390.126375] ? print_usage_bug+0xc0/0xc0 [ 390.130442] ? mark_held_locks+0x130/0x130 [ 390.134688] ? print_usage_bug+0xc0/0xc0 [ 390.138767] ? kasan_check_read+0x11/0x20 [ 390.142925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.148484] ? __lock_acquire+0x62f/0x4c20 [ 390.152729] ? debug_smp_processor_id+0x1c/0x20 [ 390.157412] ? perf_trace_lock+0x14d/0x7a0 [ 390.161650] ? perf_trace_lock+0x14d/0x7a0 [ 390.165897] ? print_usage_bug+0xc0/0xc0 [ 390.169977] ? mark_held_locks+0x130/0x130 [ 390.174219] ? lock_is_held_type+0x210/0x210 [ 390.178636] ? zap_class+0x640/0x640 [ 390.182369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.187916] ? check_preemption_disabled+0x48/0x280 [ 390.192944] ? debug_smp_processor_id+0x1c/0x20 [ 390.197618] ? perf_trace_lock+0x14d/0x7a0 [ 390.201861] ? find_held_lock+0x36/0x1c0 [ 390.205937] ? lock_is_held_type+0x210/0x210 [ 390.210353] ? is_bpf_text_address+0xac/0x170 [ 390.214863] ? lock_downgrade+0x900/0x900 [ 390.219014] ? check_preemption_disabled+0x48/0x280 [ 390.224045] ? zap_class+0x640/0x640 [ 390.227773] ? kasan_check_read+0x11/0x20 [ 390.231933] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.237221] ? rcu_softirq_qs+0x20/0x20 [ 390.241205] ? unwind_dump+0x190/0x190 [ 390.245111] ? find_held_lock+0x36/0x1c0 [ 390.249187] ? aa_file_perm+0x469/0x1060 [ 390.253266] shmem_file_read_iter+0x399/0x1010 [ 390.257886] ? shmem_mfill_atomic_pte+0x2850/0x2850 [ 390.262906] ? aa_file_perm+0x490/0x1060 [ 390.266978] ? percpu_ref_put_many+0x11c/0x260 [ 390.271572] ? aa_path_link+0x5e0/0x5e0 [ 390.275556] ? kasan_check_read+0x11/0x20 [ 390.279713] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.285223] ? rcu_softirq_qs+0x20/0x20 [ 390.289206] ? __lockdep_init_map+0x105/0x590 [ 390.293711] ? lockdep_init_map+0x9/0x10 [ 390.297787] ? debug_mutex_init+0x2d/0x60 [ 390.301948] ? __mutex_init+0x1f7/0x290 [ 390.305934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.311551] ? fsnotify+0x4e5/0xf10 [ 390.315196] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 390.320220] ? iov_iter_pipe+0xbf/0x2f0 [ 390.324216] generic_file_splice_read+0x5a5/0x9a0 [ 390.329073] ? add_to_pipe+0x360/0x360 [ 390.332989] ? rw_verify_area+0x118/0x360 [ 390.337143] ? add_to_pipe+0x360/0x360 [ 390.341040] do_splice_to+0x12e/0x190 [ 390.344857] splice_direct_to_actor+0x270/0x8f0 [ 390.349534] ? pipe_to_sendpage+0x400/0x400 [ 390.353873] ? do_splice_to+0x190/0x190 [ 390.357870] ? security_file_permission+0x1c2/0x220 [ 390.362907] ? rw_verify_area+0x118/0x360 [ 390.367070] do_splice_direct+0x2d4/0x420 [ 390.371233] ? splice_direct_to_actor+0x8f0/0x8f0 [ 390.376083] ? apparmor_file_permission+0x24/0x30 [ 390.380952] ? rw_verify_area+0x118/0x360 [ 390.385114] do_sendfile+0x62a/0xe20 [ 390.388853] ? do_compat_pwritev64+0x1c0/0x1c0 [ 390.393635] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.399180] ? _copy_from_user+0xdf/0x150 [ 390.403342] __x64_sys_sendfile64+0x15d/0x250 [ 390.407854] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 390.412460] do_syscall_64+0x1b9/0x820 [ 390.416356] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 390.421734] ? syscall_return_slowpath+0x5e0/0x5e0 [ 390.426682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.431542] ? trace_hardirqs_on_caller+0x310/0x310 [ 390.436566] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 390.441591] ? prepare_exit_to_usermode+0x291/0x3b0 [ 390.446621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.451482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.456676] RIP: 0033:0x457569 [ 390.459880] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.478800] RSP: 002b:00007fb58627fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 390.486513] RAX: ffffffffffffffda RBX: 00007fb58627fc90 RCX: 0000000000457569 [ 390.493788] RDX: 0000000020000240 RSI: 0000000000000006 RDI: 0000000000000003 [ 390.501067] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 390.508342] R10: 0020000102000007 R11: 0000000000000246 R12: 00007fb5862806d4 [ 390.515615] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000007 03:59:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)="1bef697c728000580000", 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) r0 = geteuid() syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000680)=[{&(0x7f00000003c0)="7e2e859433e6bb85d6ee49b240aff1e854ecdc2689ff445d8fd8e2ac676280410a3e6e2139c2ded6f54b2a7973f6d44647b5d81ef74e8a7aac5d33f6c5bff31e915cd6a9a4d3dd683a06af8614ef24b095f779c9905c192e932a8b9330f9cb9d818e9c8b6bc790c2d0149a1780f7afe5437b9b2ca9b02183b953e0bdb4410bf66bb801d10b4b8a599bd6686258e4b6019ba25454ad830aaa8f7604c7526a96a7f63207fb8084beece3658664061092daedc28988233d32ac1dc366", 0xbb, 0x6}, {&(0x7f00000001c0)='K', 0x1, 0x4}, {&(0x7f0000000480)="cbe6987a1f64c9c6ec4aaf6a7608dc0e9e0f14f71e9e78e04082c6eb97a0a6cf1940c4187da6451baaf24b13a348550908017e0479b08e72d059614b1f17735c23ed3011", 0x44, 0x10000}, {&(0x7f0000000600)="25b42deef88ad68c61e430b377fb584cfd33fd49ed60e59bfaec8c82a5808b7dae25814aee104e3a8c5c417ae2eb8e495e25c6dba7878e873d0507871fb59f3677391fa8a5388063536a1f17c35645273c4f188c2f633fd2960f329affc7ff052a39ae164cc6", 0x66, 0x1}], 0x800, &(0x7f0000000700)={[{@uid={'uid', 0x3d, r0}}, {@unhide='unhide'}, {@unhide='unhide'}], [{@smackfsdef={'smackfsdef', 0x3d, "47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6"}}, {@subj_type={'subj_type', 0x3d, "1bef697c7280005800"}}, {@appraise_type='appraise_type=imasig'}]}) r1 = getpgid(0x0) r2 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x8, 0x200000) write$FUSE_DIRENT(r2, &(0x7f0000000880)={0x48, 0xfffffffffffffffe, 0x2, [{0x2, 0x0, 0x0, 0x3}, {0x6, 0x23473f1b, 0x4, 0x2, 'GPL\''}]}, 0x48) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000200)={&(0x7f0000000780)="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", 0xfb}) 03:59:35 executing program 5 (fault-call:6 fault-nth:3): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) [ 390.598254] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 03:59:35 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) fcntl$setflags(r0, 0x2, 0x1) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) r3 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @multicast2}, &(0x7f0000000300)=0xc) sendmmsg(r3, &(0x7f0000002f00)=[{{&(0x7f0000000380)=@xdp={0x2c, 0x6, r4, 0x3b}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)="0ac747e34e95f37235d887fe382801b92548d8f6cab585a8b5028e5c7f725fd38d913d07baf8c8efdb22d9edfe4a32558ed76e610cd2c83b11934276b0729ab2b907a248633e008f762bd023052fd9c937090da7f7d179a25d04ba043485f0761be92d89923145a574e60658b7fdf15a72030bbaa6d18a268edea7fa16", 0x7d}, {&(0x7f0000000480)="4d6f998c0f296d11f2f4447711b09bfe4e42b112884a899a0fc02efe8e8237227e2b4ae57c30cdcb199a919612f9c330e26d40241ca547b66e84a30b3c4af1b247437823e5785fd9bcc2101d21c1d304c890d30b18d561485a83eb5b6d5fc8f291474b943fb81dfb9b56d899e6061fa4dfa4f376f9a6", 0x76}], 0x2, &(0x7f00000005c0)=[{0xe8, 0x18a, 0x5, "730bf81ae205a146c40fb07159994c5e74d9ddfb78deddea13a08c7397a6197c2242008af49ff2ff811f91459e3116ca3b35bf0378438da9887e038674e278b9638f8327c596b863c14c0b5e3b6202d3fbb7e9d843134f3facdfca9994bc8d5fae09a617c5dec3b7aec906568ec325ffd70553079cd03b7db5cedf3c88695907429746548d674196fcd999ed255d02cfddf8e40eeb821d76ce309c83b77f19a6cfbb06f70dffe277e664549dbbdca202cc1437368119234be7cbeffe46ab1da81997a5ac76bdb0df78824de6b776901260d658678e070e"}, {0xb0, 0x6, 0x1ff, "824bb251010dfc16897d3cc23ec737a3680e8462e42fd789ae0ecf90e9d8a97b2b69e079a3a672f344ad4ca194b8e858804800bad49e790d15e74009ada65db00fca5484bb61e08ccf1cf5aa682774fc5be486d6b8a2d1899e2d5c01f87b97f60d677afbbb4c3b2bd76ace2063702633bae06d396663e0cb13524289f7f645308f71d67b3c51f9d227a28f5e721307630c35744451228b3c5a"}], 0x198, 0x4000}, 0x100}, {{&(0x7f0000000780)=@l2={0x1f, 0x101, {0x10001, 0x8, 0x9, 0x20, 0x80, 0x200}, 0x8000000000000000, 0xffffffff}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000800)="a740fa3e8f391615a55acffab8ed7da8cea7764da78c583455c5f2e673c7a0fd2352ca9cdea0b7aaab2a007e3fb1dbd21d705ab04a41d338307a41d362b8f20b93503ef9a4965ba860baf6ee33eb36308f18ffce751dc39559b937bcd03219f392a41a9065217ca8a3429de8f259de0eeeb733fb25c2e3845472d31ab0356286221052337d6dddd746b12d91a455a8d5f81625591df8298a69d2657712d4f7d77c1f4e9de60e802a72903c6dec8ee86cd0232c084fb3654ff28545bf48a9db945508ed00d56744d3411d81f8757413f822afb7a0708243a2ecd6ca1a31164ea0b1c77bef2082a1", 0xe7}, {&(0x7f0000000900)="151c9e395d97ba482c67c981305ed70a9fce65b90fff9cef4486a0bff9339df559db454c4de4edfb48970ecab6cce38596576412f5c03f15fc04b5e923550eefb3184475967ef60861b51ffc1686da47aeb8fd59", 0x54}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="c910eb1e7621797724e010e74bac6a667d4205f9a75f23b6f4ca8f3648787d939b8eb8aa00be625b32cb74040c97daedfa3c8831542c35c2e1c4664e7605e1b0356b100bf8768e6a8d97b9f575c3f8b0fe5ee2063b8b2d74bb27e2058ab440d6934c9450d31cabc9d62c807c1d87850cebb6ef71104b683a75198f999a5e10742ccd1f3209964bbe8dd4e8912ce97fbbe02d4e443397ebacc127f6ee073682d92de356dd6b01a46a6f2da9c5e4cdba43c33f4a8e79fbe311eb65191a01d6b65c5eff05773e686c88e982817460aa19", 0xcf}, {&(0x7f0000000540)="73a14e9e5266c6939785c474bb1a131f8bedff0fdc884766b88d752dd080588b919c", 0x22}, {&(0x7f0000001a80)="dcc805e6899f95ca2bc694215aeea0b193a06ee53d6cb258ca8815d09f7afb3993fa226c1c0d1bcd0e0829d1ef2f2522ba09de7544af49327e7d7a9c87d1c1d4bc85a473c9911db22c30e9d9dafbd858f8267abee99bc98b0558b29fd3d78af9c43ce77bd8b2883ff006f69580c231c0f6ba90d98311783a9e1e6f47ca65b196b900582a89006b1d5b3428059c839cf11a4414288ea2987ab36ee9bd8d2e8228726729e879", 0xa5}, {&(0x7f0000001b40)="b8adf2843d1c9e22bece1d2556af77a7693d5aeb0a080db020cb3a55f27cf4d5edbb5683fa90e6c65c9f5ca03ec624ef81c039ebb44e60673839b3e3eeec6eae971486475553c54690bd80ec5fc0b366074703b86b67e57f5b98cf309095d1dc683f02d71429afeaefdfebbe668a53e1182b533eff5361e21443b5654be195b8efb4861c765a67a89d1a11e6f889f9ead170c1bc93e33943ba354477a73640925f8bf5b53424fd6320e4e2a3f43117647b", 0xb1}], 0x7, &(0x7f0000001c80), 0x0, 0x4810}, 0x6}, {{&(0x7f0000001cc0)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @loopback}, 0x4, 0x2, 0x1, 0x3}}, 0x80, &(0x7f0000002080), 0x0, 0x0, 0x0, 0x80}, 0x53}, {{&(0x7f0000002100)=@ll={0x11, 0xd, r4, 0x1, 0x7, 0x6, @local}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002180)="a263f53f5e0fa69bec6736f8e1cdd423f011a39bee65dcb8d250168c801340c976e00eb21ba36e3946ab2c9e4acc900b358d3f4d54dbf7bd236d4622d0f372ea8029fbb0a6d37537eaca1595695f399e1a30ddc308f8b1cd79e979b5100c1c4ec297a234e253766a49e45f371ee88c0d4c7b12390d819ec4c022e086c87ee67402405c37e04a2ed318cd1f440db84cf342cad436a7ac4a5fcfbe6b82a3b04e815d10f3e9892c03c89ac1b1658a993730b7165992a5b0a472a8be29", 0xbb}, {&(0x7f0000002240)="036dd98cc89ca10f38539966e2e77634faf370f95da1267bb6599b25225f36aa068c08dd83f03a963047703fdf8bc20aee0330be617e4ec304ec2e844b1dbe8070a3bf81e4fae02feb17a734b3a15514ee7bb8e288d3497d7ae347b6560da0cafdf24f0b3a82d0ff6e0ff6a3474111a24b1632d71303eae8879afbb624308363a96004580dbb016b0f9c5076cf9fa04c23cd270c1818c1fd32498345cabefc81005bb9738b2e4170b5623d7bd73be7ccc225087bad8665d9eae17fb764ae5f6a344eb5d5a5", 0xc5}, {&(0x7f0000002340)="6630f8bbca68e30631a03f014f8340d320fbf7b287c2daeb11f2b01801df126d6448ed673c727f2798bafec68604d6f833bd17a9e8af1404a03e923a428a57262aa5e748a35c3e1ee24689ff0335e921fd0d8cda797ad167d6d43371119381573eeb745569e7a55b838312fa29c19f2f2968f66532238fd2107f0e24cf14bba0e121b3d80b44df2ed8d4cdd629224db8b94b52e29a2cabbf451a6a9bd4cf615e8b335baa51f0a36f660596c8711ad480137804d81e06feddbea42812673d34bf8b04e20d060a29b316a526099dd2468ded", 0xd1}], 0x3, &(0x7f0000002480)=[{0x60, 0x84, 0x9, "772867981fb0b93dac8bd1a4f16d5d0f79941d2988b35407574e27953906162ec92ad413308cab56ae7aef7569dbf522f903338f8a9d3ede9a5b56f1b2c93bb2f557b60a0ac50d48f121148a"}, {0x60, 0x13d, 0x0, "7f9b755b51a1fa68584c637da277e00798a011ecbaa573500bf6ebeac7c8cf6cdb2493e487e536e38017f515dbab1e86321d5a199f07a7b940ccb60da9e0d70c97f3dce09406e3b2eea3f7c42a"}, {0x78, 0x10f, 0x4, "b775c45f1389e0dd41e309e29cb2619573cb32850c52b235ca1161a5b3b614c73cfb4b17b726597d0a889aa9fc6fe31ab9abb104c784b8e363e111ede0ef638a90b60138abb9892d2ac58b9957d6270b047d0132a594a1824981116387c0a8b8f095f5a34ae0d507"}, {0x110, 0x117, 0x0, "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"}, {0x70, 0x0, 0x3, "bc6ec1b3608c7c31f84a0194f6b93d66da78574ed73db6501cedbb048e29ca76835fbbf7b152809e872c69538aef4654350b597cdb8ca9b0478d3d57161713dda1af28513aa416dacc6060f02cb07bc79404c952345673ba8e"}, {0xc0, 0x10b, 0xc067, "fcc322842c8d0964c08d0e98ccc12dc1abd9fa1154900dfc7033980eaabf7e6183460b9233d2f2a98bff7ba18362070e9f02864e1af080d249bf3a7428fe0587d9cbc3a1f115a496d1af0ce8474b74e2446e454bb2e3b9d35119edcfdf9a8a0997ac0c52cffca2bffec1144dbec9fcd29f9866b5a7c3b9b6e80257cba863ab6a6c3a3cd4787beb9116cfba1f1b60d7430d302d424d109af40e92b89878d469aba6302395af92144a4d7273761a72b827"}, {0x80, 0x11, 0xdfa, "2e588782f73f7e46b2479ee500f18187ddbd2956e72220d0ae7bb611b0ef0d25a14e20266d7fb70f6cb4e1da0b1084808fa15567c441d562795a8a6a788ce1ae1d7b04a265596c6967c8c57f60f9b46c08bde4b190fd300002140d2d7d7f6f630cbf4b2d4ffa69c556c6"}, {0xf0, 0x10f, 0x200, "dc4fad974e13b42761ffa401c6a535f1d409ac8e8cbe6f990b1f072349702b6a7f5df45564226969b7867560feec87cf0dd1b3452427cade84b9d589053f9fae0c925fa9032c509aa6dc1f0869eb5ce10cacbe95681fbe4ceadb4ada4552af653ebf76547a6714b7c833857c098f6adc3a5cdddec54814da36b81256cb5e6cd721f3884592b04159b77e4fcef54d26e5fb1f1c4fdf34eec6bdd490b5853be1e289d4f050a7ab0c0aac42afd91477a74e5e5dcfc4f0d233020c6c957794cef7ccf8a6af79ba927033c87f4634f02ed199bd8cd6f66f13c8d15305"}], 0x4e8, 0x10}, 0x4}, {{0x0, 0x0, &(0x7f0000002980), 0x0, &(0x7f00000029c0)=[{0x68, 0x13f, 0x4, "8c035381b28bc9e0e74cf5dd9788a71d6dddc55be1bf0aa766c8637fa73db09dc3fe8f7bbb66c8f6361c18f07f60bf4dbd72f53a55f078d805fa6dee8c048a825ec8e2f7784f52368ebf9760c91e2543532097"}, {0xf8, 0x116, 0x9, "b99fc6319cadb74f164760810f788a5f685bc6af153b697d865e0349dfcc2c7b29e0b08bf81038c3c3b17bd1f0ebd4d921860ec097999a2dc80598ade1d5f519e474c384e852af036e043d19cbc7ecbe4bb1c6df08961df11e897cf361f0a71c1e5d4c6c3b38c1dcc4cc5e0fb15785d77ba0abdf5ee4e1c6baa4e56ae1407428ef8e56418d05e0e2a73e99b8ec183f05ae1ab7e97846bc69c3bd33918477affa71c8fa6e0cdbf281786b362d8c11f7876fe8d8150a9eb4428fd82c17000db97495a6f45bfe47e9d6df624facfcce8da55509b60b282e771b5d6a8343fad981725ce9c78713"}, {0xa0, 0x118, 0x501, "8c466266db5b1282bb0e91ca8f74ecf6d160a7e0ccbf88e2ae419e356636144551d4194fba492726446a5f6915e9536d85d5749c8e824dba0b36abd91e3514ad627af04a381179bd77bbe1aad5cb32e862781ee79e8e9eec808302ab431ec7b038ec55df8e0ca70528a9f96a0a462fffc6e307cc6864c1461055e6db94b1c7d34fef890f4a48679f1b34c033597e71"}, {0x30, 0x10d, 0x400, "78d3e8f2cf5e9760f70d8e0612fd3b25cb69971e660c7a3d5373b9"}, {0xd8, 0x11f, 0x1, "27454aa5345f56e53fadc8e83ea0c0ae2550c0e5f8d9b21a4520aeee6e7ab25626963fdbcd674b312c00261ef000ca20966878fbb5cc03b98357bd79a333b6485e24b3462205a294b9e194a2e20ef8ed2fbb435e7799a61a71ace2cabc2c4267eb742551462de8dce503fa13d4cd8f7f17b080443f34eabf2863a7c663bf2a641467874727fac3b063a094dd9059f2409d6f9f3854d78400d0181f528060efb14b339705ae653ca27175bb746888029d400f1b1f8f87125431b95c6b68436966cfb244"}, {0x28, 0x111, 0x80000000, "b23a8a1b395274f55546411a160ac2a0881c17"}, {0x110, 0x10d, 0x1, "bc3ba1d2cd9c9d10d856f2d149ecebab712e3b572a03ba47d4aa758378961cce53d9dbf6aa6b2137f6a22a0cdbf7901f0cadc9045b64948f31005a20c9407086aeb4cf5022f0efdf82581bd31666e916786cdb59c3885428edf0abaf3ecbb4f264986b24ab227e8cb1c43ea9758a6ccfeb3256249dd11947bc5018eb2f4c0ecdaa29b3920ca4b69770f4dfec83f292f02c298bf02afa035bab59c5b190d387af76e49952aeec5d4b243dd2911951b7022f2123f2c0ce9baff15a47e6a11375bc0ef1b32841bc70d31645474d9ba2d885ba0c4881d7bde76736608aeef1283e8427e140dde0f8e81c6c4fc51e669dfca0ce0c52fd5eeb4c03d8b00e55"}, {0x98, 0x0, 0x3, "26abb5675c0ac1124029a6adf427f7b25ba944150000ec3c54321baa3711422393687c8de5005b5f0d47e3a2a3c96506f5b488d712d6ea3f357601477f6ce083296045578018f13b411459797d1366b119fe7ee5955656f8e1cf8134df78559716fc0ef5534ae37ea0e3550c7e7e0ae7d367c931e524948eb43735b729d216d2c221da2db42aca06"}, {0x40, 0x11f, 0x3, "1eaff2b80f1c295611c0627b566025c96a142b44291917509b0c10109247437425d3324ba4112f1cdfef"}], 0x518, 0x20000000}, 0x4}], 0x5, 0x0) 03:59:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)="2f6465762f736e617073686f74ff", 0x80240, 0x0) 03:59:35 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffc, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2fff01000003000000000000002fd379", 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r4, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x4000) [ 390.690098] gfs2: can't parse mount arguments [ 390.757297] FAULT_INJECTION: forcing a failure. [ 390.757297] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:59:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300000e000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002008100000000000000ff000000000005000500000000000a00000000000000ff010000000000000000000000000001000000219069c1e5"], 0x70}}, 0x0) timer_create(0x5, &(0x7f00000001c0)={0x0, 0x41, 0x0, @thr={&(0x7f0000000000)="d4155c3b48a3", &(0x7f00000000c0)="aa721936381e5997ff4fe64eb7e485ba94ed3c2016bbfd0d1911e112c8d1da776536b25aa06c96d93a547b5bc0e18c4de8f3bf41f90e99d6b35e1f25d92e"}}, &(0x7f0000000200)=0x0) timer_getoverrun(r1) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x20, 0x80) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xe) [ 390.820648] CPU: 1 PID: 15585 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 390.829217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.838592] Call Trace: [ 390.841201] dump_stack+0x244/0x39d [ 390.844858] ? dump_stack_print_info.cold.1+0x20/0x20 [ 390.850069] ? perf_trace_lock+0x14d/0x7a0 [ 390.854338] should_fail.cold.4+0xa/0x17 [ 390.858438] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 390.863587] ? zap_class+0x640/0x640 03:59:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 390.867332] ? __lock_is_held+0xb5/0x140 [ 390.867357] ? find_held_lock+0x36/0x1c0 [ 390.867394] ? lock_release+0xa10/0xa10 [ 390.879488] ? perf_trace_sched_process_exec+0x860/0x860 [ 390.884963] ? rcu_softirq_qs+0x20/0x20 [ 390.888964] ? __might_sleep+0x95/0x190 [ 390.892963] __alloc_pages_nodemask+0x34b/0xdd0 [ 390.897657] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 390.902705] ? lock_downgrade+0x900/0x900 [ 390.902732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.912418] ? check_preemption_disabled+0x48/0x280 [ 390.917462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.923018] ? percpu_counter_add_batch+0x141/0x190 [ 390.928063] ? mpol_shared_policy_lookup+0xf7/0x150 [ 390.933106] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 390.938675] alloc_pages_vma+0x11e/0x4a0 [ 390.942784] shmem_alloc_page+0xa5/0x190 [ 390.946887] ? shmem_swapin+0x230/0x230 [ 390.950925] shmem_alloc_and_acct_page+0x248/0xdb0 [ 390.956438] ? shmem_getattr+0x2c0/0x2c0 [ 390.956478] ? print_usage_bug+0xc0/0xc0 [ 390.956508] ? __isolate_free_page+0x610/0x610 03:59:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 390.956529] ? __lock_acquire+0x62f/0x4c20 [ 390.956562] ? print_usage_bug+0xc0/0xc0 [ 390.956591] shmem_getpage_gfp+0x71d/0x4840 [ 390.956636] ? shmem_add_to_page_cache+0x1950/0x1950 [ 390.956655] ? print_usage_bug+0xc0/0xc0 [ 390.956691] ? debug_smp_processor_id+0x1c/0x20 [ 390.956708] ? perf_trace_lock+0x14d/0x7a0 [ 390.956735] ? __lock_acquire+0x62f/0x4c20 [ 390.956763] ? check_preemption_disabled+0x48/0x280 [ 390.956787] ? debug_smp_processor_id+0x1c/0x20 [ 390.956804] ? perf_trace_lock+0x14d/0x7a0 [ 390.956829] ? print_usage_bug+0xc0/0xc0 [ 390.956847] ? mark_held_locks+0x130/0x130 [ 390.956868] ? print_usage_bug+0xc0/0xc0 [ 390.956889] ? zap_class+0x640/0x640 [ 390.956904] ? find_held_lock+0x36/0x1c0 [ 390.956922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.956949] ? __lock_acquire+0x62f/0x4c20 [ 390.956975] ? __lock_acquire+0x62f/0x4c20 [ 390.956996] ? print_usage_bug+0xc0/0xc0 [ 390.957018] ? mark_held_locks+0x130/0x130 [ 390.957041] ? print_usage_bug+0xc0/0xc0 [ 390.957057] ? mark_held_locks+0x130/0x130 03:59:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x802c0, 0x0) [ 390.957072] ? print_usage_bug+0xc0/0xc0 [ 390.957086] ? kasan_check_read+0x11/0x20 [ 390.957107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.957132] ? __lock_acquire+0x62f/0x4c20 [ 390.957150] ? debug_smp_processor_id+0x1c/0x20 [ 390.957167] ? perf_trace_lock+0x14d/0x7a0 [ 390.957182] ? perf_trace_lock+0x14d/0x7a0 [ 390.957201] ? print_usage_bug+0xc0/0xc0 [ 390.957230] ? mark_held_locks+0x130/0x130 [ 390.957247] ? lock_is_held_type+0x210/0x210 [ 390.957265] ? zap_class+0x640/0x640 [ 390.957301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.957318] ? check_preemption_disabled+0x48/0x280 [ 390.957341] ? debug_smp_processor_id+0x1c/0x20 [ 390.957357] ? perf_trace_lock+0x14d/0x7a0 [ 390.957372] ? find_held_lock+0x36/0x1c0 [ 390.957397] ? lock_is_held_type+0x210/0x210 [ 390.957418] ? is_bpf_text_address+0xac/0x170 [ 390.957437] ? lock_downgrade+0x900/0x900 [ 390.957452] ? check_preemption_disabled+0x48/0x280 [ 390.957474] ? zap_class+0x640/0x640 [ 390.957488] ? kasan_check_read+0x11/0x20 [ 390.957508] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.957530] ? rcu_softirq_qs+0x20/0x20 [ 390.992006] ? unwind_dump+0x190/0x190 [ 391.010156] ? find_held_lock+0x36/0x1c0 [ 391.010186] ? aa_file_perm+0x469/0x1060 [ 391.010215] shmem_file_read_iter+0x399/0x1010 [ 391.100960] ? shmem_mfill_atomic_pte+0x2850/0x2850 [ 391.109228] ? aa_file_perm+0x490/0x1060 [ 391.109251] ? percpu_ref_put_many+0x11c/0x260 [ 391.109273] ? aa_path_link+0x5e0/0x5e0 [ 391.109298] ? kasan_check_read+0x11/0x20 [ 391.176074] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 391.176096] ? rcu_softirq_qs+0x20/0x20 [ 391.176118] ? __lockdep_init_map+0x105/0x590 [ 391.176138] ? lockdep_init_map+0x9/0x10 [ 391.176153] ? debug_mutex_init+0x2d/0x60 [ 391.176173] ? __mutex_init+0x1f7/0x290 [ 391.184138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.184158] ? fsnotify+0x4e5/0xf10 [ 391.184182] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 391.184202] ? iov_iter_pipe+0xbf/0x2f0 [ 391.258604] generic_file_splice_read+0x5a5/0x9a0 [ 391.258628] ? add_to_pipe+0x360/0x360 [ 391.267379] ? rw_verify_area+0x118/0x360 [ 391.271532] ? add_to_pipe+0x360/0x360 [ 391.275431] do_splice_to+0x12e/0x190 [ 391.279227] splice_direct_to_actor+0x270/0x8f0 [ 391.283891] ? pipe_to_sendpage+0x400/0x400 [ 391.288208] ? do_splice_to+0x190/0x190 [ 391.292176] ? security_file_permission+0x1c2/0x220 [ 391.297187] ? rw_verify_area+0x118/0x360 [ 391.301332] do_splice_direct+0x2d4/0x420 [ 391.305476] ? splice_direct_to_actor+0x8f0/0x8f0 [ 391.310330] ? apparmor_file_permission+0x24/0x30 [ 391.315181] ? rw_verify_area+0x118/0x360 [ 391.319337] do_sendfile+0x62a/0xe20 [ 391.323087] ? do_compat_pwritev64+0x1c0/0x1c0 [ 391.327674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 391.333210] ? _copy_from_user+0xdf/0x150 [ 391.337376] __x64_sys_sendfile64+0x15d/0x250 [ 391.341891] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 391.346476] do_syscall_64+0x1b9/0x820 [ 391.350376] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 391.355733] ? syscall_return_slowpath+0x5e0/0x5e0 [ 391.360653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.365492] ? trace_hardirqs_on_caller+0x310/0x310 [ 391.370500] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 391.375508] ? prepare_exit_to_usermode+0x291/0x3b0 [ 391.380519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.385381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.390595] RIP: 0033:0x457569 [ 391.393783] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.412681] RSP: 002b:00007fb58627fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:59:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x22, 0x202000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000300)={0x10000, 0x4, 0x1, 0x3}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x1, 0x40000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x31, &(0x7f0000000040)='&}mime_typevboxnet1%em1ppp1vmnet0bdevvmnet1/:$/&\x00'}, 0x30) syz_open_procfs(r2, &(0x7f00000000c0)='net/ip_tables_matches\x00') 03:59:36 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = inotify_init1(0x0) mknod(&(0x7f0000000000)='./file0\x00', 0xc000, 0x0) close(r2) 03:59:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xebffffff00000000) [ 391.420397] RAX: ffffffffffffffda RBX: 00007fb58627fc90 RCX: 0000000000457569 [ 391.427655] RDX: 0000000020000240 RSI: 0000000000000006 RDI: 0000000000000003 [ 391.434914] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 391.442179] R10: 0020000102000007 R11: 0000000000000246 R12: 00007fb5862806d4 [ 391.449453] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000007 03:59:36 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:36 executing program 5 (fault-call:6 fault-nth:4): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) 03:59:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x4000000) 03:59:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x410040, 0x0) r2 = request_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='eth0[nodev\x00', 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='teql0\x00', 0xfffffffffffffffd) keyctl$link(0x8, r2, r3) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x44) accept4$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14, 0x800) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0x3, 0x8000, 0x0, 0x5, 0x40}) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'teql0\x00'}) 03:59:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='cpuset\x00') r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") preadv(r0, &(0x7f0000000000), 0x0, 0x0) 03:59:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000580)=ANY=[]) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x10001}, &(0x7f0000000280)=0x14) keyctl$join(0x1, &(0x7f0000000300)={'syz'}) fchdir(r0) splice(r0, &(0x7f0000000040)=0x19, r0, &(0x7f0000000080), 0x4, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/25, 0x19, 0x0) sendfile(r1, r1, &(0x7f0000000340), 0x81) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) 03:59:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x2, &(0x7f0000000100)="153f6234488dd25d766070") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) read(r2, &(0x7f0000000140)=""/43, 0x2b) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) dup2(r0, r2) tkill(r1, 0x1000000000015) 03:59:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x2, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x800, 0x7a}, &(0x7f00000001c0)=0xc) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffffffffffc0, 0x408100) write$P9_RRENAME(r2, &(0x7f0000000240)={0x7, 0x15, 0x1}, 0x7) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)=0xc000000000000000, 0x4) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x6000000000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000002200050000000000000000030000000005000b002f000000", @ANYRES32], 0x20}}, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x204000, 0x0) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r4, &(0x7f0000000540)={0xa0, 0x19, 0x2, {0x0, {0x20, 0x3}, 0x40, r5, r6, 0x7, 0x5, 0x0, 0x531, 0x0, 0x401, 0x2, 0x8, 0x9, 0xfffffffffffff650, 0x23, 0xf57, 0xffffffffffffffef, 0xfffffffffffffffe, 0x40}}, 0xa0) [ 391.739178] FAULT_INJECTION: forcing a failure. [ 391.739178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:59:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x3f000000) [ 391.837106] CPU: 1 PID: 15649 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 391.845645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.855012] Call Trace: [ 391.857629] dump_stack+0x244/0x39d [ 391.861300] ? dump_stack_print_info.cold.1+0x20/0x20 [ 391.866527] ? shmem_getpage_gfp+0x1c99/0x4840 [ 391.871135] ? shmem_file_read_iter+0x399/0x1010 [ 391.875911] ? generic_file_splice_read+0x5a5/0x9a0 [ 391.880956] ? do_splice_to+0x12e/0x190 [ 391.884953] should_fail.cold.4+0xa/0x17 [ 391.889042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 391.894168] ? zap_class+0x640/0x640 [ 391.897910] ? check_preemption_disabled+0x48/0x280 [ 391.902957] ? __lock_is_held+0xb5/0x140 [ 391.907041] ? find_held_lock+0x36/0x1c0 [ 391.911145] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 391.916094] ? perf_trace_sched_process_exec+0x860/0x860 [ 391.921568] ? perf_trace_lock+0x14d/0x7a0 [ 391.925823] ? rcu_softirq_qs+0x20/0x20 [ 391.929822] ? __might_sleep+0x95/0x190 03:59:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xffffffeb) 03:59:36 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000080)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/164, 0xa4}, {&(0x7f0000000100)=""/98, 0x62}, {&(0x7f0000000340)=""/183, 0xb7}, {&(0x7f0000000400)=""/199, 0xc7}, {&(0x7f0000000500)=""/203, 0xcb}], 0x6, &(0x7f0000000680)=""/87, 0x57, 0x5}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') preadv(r2, &(0x7f0000000100), 0x2a2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000740)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000780)={0x7}) [ 391.933825] __alloc_pages_nodemask+0x34b/0xdd0 [ 391.938520] ? zap_class+0x640/0x640 [ 391.942259] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 391.947324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.952880] ? check_preemption_disabled+0x48/0x280 [ 391.957925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.963482] ? percpu_counter_add_batch+0x141/0x190 [ 391.968526] ? mpol_shared_policy_lookup+0xf7/0x150 [ 391.973575] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 391.979141] alloc_pages_vma+0x11e/0x4a0 [ 391.983245] shmem_alloc_page+0xa5/0x190 [ 391.987340] ? shmem_swapin+0x230/0x230 [ 391.991378] shmem_alloc_and_acct_page+0x248/0xdb0 [ 391.996339] ? shmem_getattr+0x2c0/0x2c0 [ 392.000421] ? find_held_lock+0x36/0x1c0 [ 392.004530] ? shmem_getpage_gfp+0x1f7d/0x4840 [ 392.009150] ? _raw_spin_unlock_irq+0x27/0x80 [ 392.013666] ? _raw_spin_unlock_irq+0x27/0x80 [ 392.018182] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 392.022786] ? trace_hardirqs_on+0xbd/0x310 [ 392.027121] ? kasan_check_read+0x11/0x20 [ 392.031287] ? shmem_getpage_gfp+0x1f7d/0x4840 [ 392.035889] ? trace_hardirqs_off_caller+0x300/0x300 [ 392.041031] shmem_getpage_gfp+0x71d/0x4840 [ 392.045404] ? shmem_add_to_page_cache+0x1950/0x1950 [ 392.050523] ? print_usage_bug+0xc0/0xc0 [ 392.054611] ? mark_held_locks+0x130/0x130 [ 392.058862] ? debug_smp_processor_id+0x1c/0x20 [ 392.063575] ? perf_trace_lock+0x14d/0x7a0 [ 392.067837] ? __lock_acquire+0x62f/0x4c20 [ 392.072080] ? check_preemption_disabled+0x48/0x280 [ 392.077118] ? debug_smp_processor_id+0x1c/0x20 [ 392.081801] ? perf_trace_lock+0x14d/0x7a0 [ 392.086060] ? print_usage_bug+0xc0/0xc0 [ 392.090133] ? mark_held_locks+0x130/0x130 [ 392.094384] ? print_usage_bug+0xc0/0xc0 [ 392.098463] ? zap_class+0x640/0x640 [ 392.102184] ? find_held_lock+0x36/0x1c0 [ 392.106259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.111826] ? __lock_acquire+0x62f/0x4c20 [ 392.116086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.121642] ? mark_page_accessed+0xcaf/0x2040 [ 392.126251] ? activate_page+0x1040/0x1040 [ 392.130506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.136063] ? page_mapping+0x5a2/0xa50 [ 392.140049] ? __page_mapcount+0x580/0x580 [ 392.144303] ? print_usage_bug+0xc0/0xc0 [ 392.148380] ? mark_held_locks+0x130/0x130 [ 392.152622] ? print_usage_bug+0xc0/0xc0 [ 392.156690] ? kasan_check_read+0x11/0x20 [ 392.160852] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.166408] ? __set_page_dirty_no_writeback+0x3c9/0x6c0 [ 392.171874] ? do_writepages+0x1a0/0x1a0 [ 392.175952] ? __lock_acquire+0x62f/0x4c20 [ 392.180199] ? debug_smp_processor_id+0x1c/0x20 [ 392.184878] ? perf_trace_lock+0x14d/0x7a0 [ 392.189124] ? perf_trace_lock+0x14d/0x7a0 [ 392.193377] ? print_usage_bug+0xc0/0xc0 [ 392.197476] ? lock_is_held_type+0x210/0x210 [ 392.201908] ? do_writepages+0x1a0/0x1a0 [ 392.205982] ? set_page_dirty+0x639/0x1030 [ 392.210233] ? __writepage+0xe0/0xe0 [ 392.213957] ? check_preemption_disabled+0x48/0x280 [ 392.218998] ? perf_trace_lock+0x14d/0x7a0 [ 392.223240] ? find_held_lock+0x36/0x1c0 [ 392.227331] ? lock_is_held_type+0x210/0x210 [ 392.231769] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.236803] ? sanity+0x23c/0x340 [ 392.240269] ? check_preemption_disabled+0x48/0x280 [ 392.245317] ? kasan_check_write+0x14/0x20 [ 392.249569] ? copy_page_to_iter+0x560/0xff0 [ 392.254026] ? perf_trace_sched_process_exec+0x860/0x860 [ 392.259488] ? aa_file_perm+0x469/0x1060 [ 392.263574] shmem_file_read_iter+0x399/0x1010 [ 392.268201] ? shmem_mfill_atomic_pte+0x2850/0x2850 [ 392.273228] ? aa_file_perm+0x490/0x1060 [ 392.277311] ? percpu_ref_put_many+0x11c/0x260 [ 392.281914] ? aa_path_link+0x5e0/0x5e0 [ 392.285912] ? kasan_check_read+0x11/0x20 [ 392.290072] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 392.295367] ? rcu_softirq_qs+0x20/0x20 [ 392.299355] ? __lockdep_init_map+0x105/0x590 [ 392.303872] ? lockdep_init_map+0x9/0x10 [ 392.307942] ? debug_mutex_init+0x2d/0x60 [ 392.312107] ? __mutex_init+0x1f7/0x290 [ 392.316107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.321655] ? fsnotify+0x4e5/0xf10 [ 392.325307] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.330336] ? iov_iter_pipe+0xbf/0x2f0 [ 392.334329] generic_file_splice_read+0x5a5/0x9a0 [ 392.339206] ? add_to_pipe+0x360/0x360 [ 392.343140] ? rw_verify_area+0x118/0x360 [ 392.347308] ? add_to_pipe+0x360/0x360 [ 392.351208] do_splice_to+0x12e/0x190 [ 392.355030] splice_direct_to_actor+0x270/0x8f0 [ 392.359715] ? pipe_to_sendpage+0x400/0x400 [ 392.364058] ? do_splice_to+0x190/0x190 [ 392.368048] ? security_file_permission+0x1c2/0x220 [ 392.373085] ? rw_verify_area+0x118/0x360 [ 392.377253] do_splice_direct+0x2d4/0x420 [ 392.381425] ? splice_direct_to_actor+0x8f0/0x8f0 [ 392.386290] ? apparmor_file_permission+0x24/0x30 [ 392.391157] ? rw_verify_area+0x118/0x360 [ 392.395332] do_sendfile+0x62a/0xe20 [ 392.399076] ? do_compat_pwritev64+0x1c0/0x1c0 [ 392.403687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.409234] ? _copy_from_user+0xdf/0x150 [ 392.413405] __x64_sys_sendfile64+0x15d/0x250 [ 392.417922] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 392.422539] do_syscall_64+0x1b9/0x820 [ 392.426440] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 392.431822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 392.436761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.441620] ? trace_hardirqs_on_caller+0x310/0x310 [ 392.446683] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 392.451717] ? prepare_exit_to_usermode+0x291/0x3b0 [ 392.456754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.461632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.466832] RIP: 0033:0x457569 [ 392.470036] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:59:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xfffffff6) [ 392.488944] RSP: 002b:00007fb58627fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 392.496666] RAX: ffffffffffffffda RBX: 00007fb58627fc90 RCX: 0000000000457569 [ 392.503944] RDX: 0000000020000240 RSI: 0000000000000006 RDI: 0000000000000003 [ 392.511224] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.518506] R10: 0020000102000007 R11: 0000000000000246 R12: 00007fb5862806d4 [ 392.525783] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000007 03:59:37 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000b40)=[{{&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="a96f19e0f8524e8e96dc6f6ab817a434493e3bd4767c86f3ac2882524dfde817fa114ff28b85dc48bc38f83ef0866edc36435755602e344f7c92a63a95a41ae84ff16ba35c2fdd7b3c58c5f3406e01a1c8c1e64ac38bc12c6b8e29f04429e9948a7bfc8561c4f223d911dd2e426cbbdd74f18cd623c60bed5cf6abf8dabe489ef35edacaa21135154a4ae4db988238a7f378f9141a003239584c95c582e20e4be976814c93be35e1e0255de9ce5dda95e59765b3917623a9a11785cd99b6155f2d7f6e896893dbd3e09776b8f07199a9fbfd242731a8f668ed56625a22f2fa88dd2ebfee3709", 0xe6}, {&(0x7f00000000c0)="0bd8f63bc5e886", 0x7}], 0x2, &(0x7f0000000300)=[{0x48, 0x13f, 0x4, "877293edc4328115be7fd2ee7a0ceac39118d29357c10e3abf50651683bdf3ec1bf1c2b8538004358b9104721ee851dff093f9bd382a23"}, {0xb0, 0xff, 0xfffffffffffffe01, "e5442aa42b2d94bc0d072a90625c21a8196465f983bf5aaca08ae9389b5153b42a56657bfa9b6dc8567dddc9d0cfa9f93bcd8a165a163d322a04793c76ca73aecb935bd61939ffc4ecdc96f7764e507948dd37747c0419fce259d64c6b0959af457576f5e612a3d92bf4e8ed4d8b3db92db72e77013c154dd9d36af67d9d4fc5784fa7313eb78d6ecf11e91a7963c1fa82fa6767f00698e8d3cd5606"}, {0x70, 0x0, 0x7fff, "6c00e4747a1526dfc7743a0062467abea13aaec9ef87ad66af682e6692e2df39fb74f753c123f677ecd796e151c3c09df4301cd5ec907d1b2d7404d22d527e8ca301d30ca4d75d8703d844537853531fb07361d7cb7f6bf8ff38"}, {0x100, 0x10d, 0x0, "4a7a8c8a22ed6fa227114d9b4775b45f55b9263ecb8c6031089943c1fb2e221d11dde4c3d3a601273f7c750cea6054db59258609c8e8e9c13b674c9e6e93925938c8b80971ae4470ae44260ba4a3201bba1234cf1443b9b7dfd93c3deb64c06d1a03b8fa3349f46f5e0a80620f283af0e60bc65e686cfb99720cecf3c8ec70a0de5752744847a0379846259c915711e147fe64c3479c9305320f5b69ffac03d4ff905f96992681eb7f1fb7ca13a6ffbe19565a3b84c895d2149648dde07233b1d172919f3334481f44c5c0614ec36407d326a1ba6d2fdc492f8b4cc0e5c425d8133edae7e0754f66fe5b0b813d7b"}, {0xa0, 0x10b, 0x907, "3d8481a66424838d29390f27b23c456d0d82698202fe1d10b1a2233dd0cd6d36efc14a194b3e115ee3223f4359932712b1e010fef8d6868cf9812c740807105d7e3c2c38161a03852114e59dc18ae237357587fd35e6a656f36f15d971bbc7b2aa4bab1c6f55772da71eb0629896e98befaaa5b6550bae5d9f59ea59a6ed2a65a617b9b7db7058a33986"}, {0xf0, 0x11f, 0x8d, "fb0db27f25617e34a7d9bd4db43c907aca79ae137565e106da206b99b846df9cf7e166325ba33e9ae7ac66e198f4b17fc44916d25e2aba459da74f10e165ac84f051837c4dd01dd54d224c8a63b5ef2944b12091e5a9b8927bdf5d423be5e9e6233452ed65ed3d5f4f8556b98aa9aab83f007354ed9bb73806740953cad3ebbc90ccf106ec38ba6560438c7979ebf4a693f4e7fd6dc19e52c5adda97666c8563b64f91c2e53628e5be84e85b80d95ed04dfa7fc828b883bf5508aba40e1a3b14052e14bc43c5c82680f0138757d416f81a806374b9307c110005d2"}, {0xb8, 0x100, 0x6f7e85b9, "00878a7928b1af85dfd56065904e7e41ff3d40c1a359416574edfc6b91bdb84c28b2955e93746685893f33bd24c88199eeba0d8d61f7f6475aa3b6ecfed9264f21ddd866cd013a4efb0261c84183dd2e81f373c54904ef4af2d135099b4a9b5a23f5f9c3582805e31c3776200ea5e1ff1c4c860fd20048f55b530c899091ac8c910b3ef4dc6266d46643ec1d000bedfc79a5e0913d533f7ccdd64951345fce690a7906a886fe1c0b"}, {0xf8, 0x0, 0xde, "47e6a9c73dd61e41a8e232e776660388c277dcbcec62125b13ff611133265130ca92fe18fcfd27297946b2f60740fb6cd0289b4375242ce15002b1d24b8f02f312a56786b91c585030e2ef203d5b1950116c9ac5fa9df311874ba676ecb9fe7f61ffb5ab31b254dd6875edccbb6e38545ac4297a554a12ae874dc9f22ed426e77c05ea67d59a63b1ef84d673cc450a2963048f9e15f7bc3c4dd68ac8d0f5d732e4142ba1933954a94ff3a729f5e838cee31ded3e75fabff45f2f8e3b85377817c0e66d0400f0ceb69b818cd988d8da993a4c627b136e0a6781ef729787adfda5f63bbbfe5e"}, {0x98, 0x11b, 0x10001, "eed204c6e3a9a77ceea56b105a89e70d33820d5c84d2da237284e9e3841149fdd6d20ceef6af26529bc46255c346c3a760c3e020b5ffc0013dc060b97c0aba743cb758fd707b1714feeafd7c494f36a31358d4411632cd88bc17338f1c7c6cfd990e19ad0355bdf28042e5eb36b1b67df2fd7c4a2fb5f7be748b3571a15a003b5e85f82b31"}, {0x50, 0x111, 0xb4b8, "80845ecff14c16ef721fe8ae3f501be38256fdd86a1f01e873d217666445ddee4fcdebe1d012e333c9577f505b96c4b0806999b9399d72e8293329f971"}], 0x690, 0x1}}, {{&(0x7f00000009c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @broadcast}, 0x1, 0x0, 0x2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000a40)="611796b7ca9e6e27c81ca5d07d7439c5d5fbec44f11749c8610a1ee21012169e44d2a4e1800571a0356a94e34946cb2e60fa8040b8fe28566e93b822260e3529230cd2ffccee393a05990e470eb3b9842e46c1b077e367f57782f2d634c01e5929ce6a867d257e50ba75646216c5d7e537efac38f0d9f7a8e973f8289339df608ea543b558cfa8b187a16cecfe545b821f55ab63b81600ed1d2fea05feb87562ac65afd2a31f617f7513fa53a6d6d5ffdaa62eba593f3e448d2228d3ff0bd78b42df732d7689d0edc7d7e0501042f562d447022f27692d56628783be9bb7b59cc5107d784f0f17b08b1e49dc959b228df0f21410b1d7cf6bd3", 0xf9}], 0x1, 0x0, 0x0, 0x4000}, 0x2}], 0x2, 0x44004) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 03:59:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240), 0x20000102000007) 03:59:37 executing program 0: unshare(0x600) fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xa1, 0x460001) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80080, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+10000}, {0x77359400}}, 0x100) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYBLOB="05000000ff0f72c9f289c2610ee1f0ea23a33f4358de0717fa2f86d15d3d0c57e68366caa0054efcb248c08376d805b2b0f5b2cebf0b14a30d1caffe836674a49f62e63f4c97e0c3e12283b7cfb9c5ab33ba28b7ac9c79515d73081d4348ebb601d5cc78c66d25cf5c3be6d0521d6872f9959cd8a39000ad31e3fd3228acdbcc1032ef4ba2cbdf4e09ea67c0d4b704862273302278093ee86de7b51fe7adfc6b390d808d33fa116618ad8ab6bc3e3734ebc69c2ba293bf343193539bc3866c72bdcfa82fc562717d1fc70000000000000000"]) 03:59:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x4) 03:59:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0xa4}}, 0x50) 03:59:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = semget$private(0x0, 0x4, 0x0) io_setup(0xfffffffffffffff8, &(0x7f0000000000)=0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000003c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000400)={r5}) getgid() r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x12) io_submit(r3, 0x2, &(0x7f0000000340)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x7ff, r0, &(0x7f0000000140)="951a4fe0034f2ad7d5d867a042e48c41b06f37a359515ed0b86ad7c2799a6f372fe8742976080b5d6c5cf1008c1ed443e2812d2d7b675153db88d4f40b77fb1a718b6ac656d811bd4e8e12729008c56a25eb76ecde65e94f6c011064941e078fdd953ec3721a98c2d5d0f1b9ff92a21e7dfa35ccedf83746302654233a0fe06b803a5d2a9a45c4a18a0349f622bc71d2fc248003d2034a19c07127254835c902c9e4dd4f579f4085ad362663da86cc6cb3a1502513d9aa4d4684132aa6cb2c52227aab1a2e02a7708802635de93b0a70", 0xd0, 0x4d, 0x0, 0x1, r6}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x3f, r1, &(0x7f0000000240)="1ba84f0a99d6d7fa5525c0ecc5bd11023cac933fd7d5c4a3f474003779c1b15b36c1cdebb6b8c636d0c17e11dbf84e7a1f2a91e36f43463135021f1bc34f62b056dbaca9d3f379103520d1749884f21be05457f753a4e40b536089f94a9e410d03db74dea3b6e58f057774140e5ba02597dae3caa7f9657f6e37c759475010088e0fd264fa5af15a98a7cc9c84249f465dd53c37e0e52e67a6147580ef257a91c4357fa17ae63a91", 0xa8, 0x6}]) semop(r2, &(0x7f0000000040)=[{0x0, 0x7fffffff}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) 03:59:37 executing program 0: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r1, &(0x7f0000000040)=@nl=@proc, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e23, 0x2, @mcast2, 0x8001}}, [0x0, 0x8001, 0x9, 0xa6, 0x4000, 0x8, 0x0, 0x7, 0x5e, 0x100000000, 0x82, 0x10001, 0x6, 0x7ff, 0x3ba]}, &(0x7f0000000280)=0x100) r4 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x1000, 0x2000) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x9) prctl$getreaper(0x3b, &(0x7f0000000300)) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000340)={'filter\x00', 0xca, "def8a3b44275a2d8c26a6a49162ab90b99aee5a719abaf01651ef2defd8be6501561f118416a0c3a03eae7b9d703e579fc540a167a4ef1cf626f6cd62811bea145a445a1bb82716b2989da4c42e0c0de5526b39395f1f150bf9191cb76c6da1dcdb5489af229afbfffb9068bfed1afac484354953442a86bf0529b5880cdcdca405240a358eacbe66e9ac63b24a184d8e9352b9fbd8e5f52a7d9539d7ccdb3f46be7520965a32d8472388e069b7858e37b7ea3bcee185132f84fcc24583c13381953ae3181fda5ec084d"}, &(0x7f0000000440)=0xee) r5 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000540)={r6, @multicast1, @loopback}, 0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000580)={r3, 0x26, 0x3, 0x5}, 0x10) r7 = accept4(r0, &(0x7f00000005c0)=@rc, &(0x7f0000000640)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000680)={r2, @in={{0x2, 0x4e23}}, 0x0, 0x9, 0x10000, 0x401}, &(0x7f0000000740)=0x98) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000780)={0x8, [0x6, 0x9, 0xfffffffffffffff8, 0xffffffff, 0x8, 0x100, 0xda3, 0x0]}, &(0x7f00000007c0)=0x14) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000800), &(0x7f0000000840)=0x10) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, &(0x7f0000000880)={0x3, 0x2}) r8 = socket$inet6(0xa, 0x6, 0xf108) socket(0xa, 0x800, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000008c0)={0xffffffffffffffe2, 0x6, 0x7fffffff, 0x13, r3}, &(0x7f0000000900)=0x10) getsockopt$inet6_tcp_int(r4, 0x6, 0x34, &(0x7f0000000940), &(0x7f0000000980)=0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f00000009c0)={r3, 0x3ff, 0x5, [0x7, 0x1, 0x4, 0x4, 0x8]}, 0x12) fchdir(r7) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000a00)=0x7f) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r7, 0x29, 0xd3, &(0x7f0000000a40)={{0xa, 0x4e24, 0x1ff, @empty, 0xcdf}, {0xa, 0x4e21, 0x4, @ipv4={[], [], @broadcast}, 0x3}, 0x40, [0x0, 0x6, 0xfffffffffffff8b9, 0x5, 0x5, 0x100000001, 0x800, 0xe]}, 0x5c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000ac0)=0xaee, 0x4) 03:59:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x400000000000000) 03:59:37 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x0) r0 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000001c0)=r0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00cef6d6ba70ad113915d112518a7f46dbab8549eea7a557f97ce0a26b9e558b00a72005adb1d807846537de3daea5ebfbc28444720c0e8b8a3b220d76e47a817f0100000000000000b0a6b9f9791d22306388add6554a8fc6a4b9af3e694648b474a43690cc49ce5711f43f7e8c4e8b1a3ac30e9ab5e55cbd5b44672081316670fba1b6b91fc33fe788199c89da055490f776c6a103498816df0be5542488ef055c86ba7ac1e7f7f2accfbd294efa76c4c8c54148", @ANYRES16=r3, @ANYBLOB="000627bd7000fcdbdf25080000001400030008000500ffffffff08000100030000000c0001000800090079000000340002000800050008000000080003000300000008000600465d0000080006000900000008000b000200000008000b000a0000004c000100080009001900000008000500030000000800090067000000080005000100000008000b007369700008000500020000000800090067000000080009000c00000008000600776c63006400030008000800020000000800010000000000140002007465616d30000000000000000000000008000500ac1414aa14000600fe8000000000000000000000000000aa080008000600000008000500e0000002080001000000000008000400080000000800060063650000400001000c0006006c626c630000000014000300ffffffff0000000000000000000000000800080000100000080002003a0000000c000700040000000a0000000c00010008000600736564000800060006000000"], 0x174}, 0x1, 0x0, 0x0, 0x4000}, 0x801) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) 03:59:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x3f00000000000000) 03:59:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf000000, 0x20000102000007) 03:59:38 executing program 0: socketpair$inet(0x2, 0x0, 0x400, &(0x7f0000002b80)={0xffffffffffffffff, 0xffffffffffffffff}) setresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/exec\x00') clock_adjtime(0x0, &(0x7f0000000600)={0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x8, 0x0, 0x40, 0x0, 0x2, 0x0, 0x1}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x8da75fb31cf1629, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x2}}, 0x18) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x1000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000028c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000002e80)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002e40)={&(0x7f0000002d00)={0x110, r3, 0x311, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x94d9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1f9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1f}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xc338}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x28}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x3f}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x110}, 0x1, 0x0, 0x0, 0x40880}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) write$9p(r1, &(0x7f0000002ec0)="9ee5811285cce1d15126189de7abfbe52195dfa1b532dd92280e294cdf0041fbe02bd8ff99ec6c8c5d30fc7907c8da875584549fd02265d64aca6bcae2548a366e0c862b6478f0ba2d97eb7786b4d6315133987026714e4f6cbcca19bd872525de78a8213d42c5813c5175f459087048cfe47ac11c79de991127836afd88703eaaedaeb4a66164b7b8be33879667111edf63af9f5ac952a7baaae9e9b84c18877a43677d495bb7d1349bee058e5ce3c6297b23255c6bd74a39bc6b6d52af492a684602d8bcc486cd9b79ce0a1d", 0xcd) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0x6c, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000280)=0xff7b) 03:59:38 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x174, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:38 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000000)) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x484800) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x10001}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e21, 0xef, @mcast2, 0x81}}, 0x4d4, 0x748c3223}, 0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e20, 0x3ff, @local, 0x3}}, 0x4, 0x47a}, 0x90) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000040)={0x0, 0x0, [0x103, 0x2, 0x21, 0x7]}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000140)=0x101, 0x4) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) 03:59:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="01010000000ef40000000300409d9254", 0x10) r4 = accept4(r3, 0x0, &(0x7f0000000440), 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x48004) r5 = dup(r4) write$P9_RFLUSH(r5, &(0x7f0000000000)={0x7}, 0x7) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) fgetxattr(r0, &(0x7f00000000c0)=@random={'trusted.', 'ghash-generic\x00'}, &(0x7f0000000140)=""/124, 0x7c) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) close(r2) close(r2) 03:59:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xebffffff) 03:59:38 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000005100)=0xffffff65) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[]}}, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000340)={{0x0, @loopback, 0x4e23, 0x3, 'sh\x00', 0x8, 0x8}, {@dev, 0x4e22, 0x0, 0x0, 0x8}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000200)=0x8) sched_setattr(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086610, &(0x7f0000000040)={0x7ff00}) 03:59:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x17, 0x20000102000007) 03:59:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x500) 03:59:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x5, 0x0) r2 = shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000e40), 0xffc, 0x0, &(0x7f00000004c0)={0x2, 0x0, @loopback}, 0x10) [ 393.441534] EXT4-fs (sda1): resizing filesystem from 524032 to 524032 blocks 03:59:38 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0xffad, 0x101}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e22, 0x10001, @mcast2, 0x3}}, 0x5, 0x6, 0x10000, 0x1, 0x1000}, &(0x7f0000000100)=0x98) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000140), &(0x7f00000002c0)=0x4) close(r3) 03:59:38 executing program 3: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x15) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000280)={0x200, 0x7, 0x4, 0x7f, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) tkill(r0, 0x12) 03:59:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x5) 03:59:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000400)={0x2f, 0x676, 0x3, 0xfffffffffffff001, 0x5c, 0x2, 0x401, 0x0, 0x3, 0x8}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x70bd29}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000040)=0x5) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10000, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(r3, &(0x7f0000000380), &(0x7f0000000580)=0xc) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x3) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000180)=0x4ffd) 03:59:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001680)={'bridge0\x00', 0x0}) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e) sync_file_range(r3, 0x83, 0x6, 0x5) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=ANY=[@ANYBLOB="30010000000005010000000000ac2c497a795f2a", @ANYRES32=r1, @ANYBLOB="000000000000000004002b000c00010008000000", @ANYRES32], 0x30}}, 0x0) 03:59:38 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000bc0)='./file1\x00', &(0x7f0000000c00)='trusted.overlay.nlink\x00', &(0x7f0000000c40)={'L-', 0xfff}, 0x28, 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000280)={0x9902, 0xfffffffffffffffe, 0x7, 0x1, [], [], [], 0x0, 0x9, 0x0, 0x81, "ab19b05dcf5f02396b046680c62dd4d1"}) fchdir(r0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x8) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000057c0), 0x0, 0x40) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200)={0x27, 0x1, 0x0, 0x3, 0x0, 0x1, "1b3ad00e8b6a7d6c1f59da6d4bc8a3825b8800e28197c25fc900dbc33fd4df750920edd583b6560e6fb72b836a6f5fd62988d4d12fa97961e13444a73132ef", 0x27}, 0x60) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0xd1) fsync(0xffffffffffffffff) 03:59:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1a, 0x20000102000007) 03:59:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x500000000000000) 03:59:38 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000040)=0x2, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) [ 393.849076] overlayfs: failed to resolve './file1': -2 03:59:38 executing program 0: rseq(&(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6, 0x80000000, 0x10000, 0x5}, 0x2}, 0x20, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='cmdline\x00') syz_open_dev$evdev(&(0x7f0000000780)='/dev/input/event#\x00', 0x4, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) sendfile(r3, r2, &(0x7f0000000000), 0x800) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r5 = add_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r4, r5) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000006c0)={0x9, 0x800, 0x0, 'queue0\x00'}) r6 = shmget$private(0x0, 0x3000, 0x1028, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r6, 0x2, &(0x7f00000004c0)=""/247) r7 = semget$private(0x0, 0x3, 0x10) semctl$SEM_INFO(r7, 0x2, 0x13, &(0x7f0000000640)=""/120) r8 = syz_open_dev$sndpcmp(&(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', 0xa541, 0x8000) ioctl$ION_IOC_HEAP_QUERY(r8, 0xc0184908, &(0x7f0000000600)={0x34, 0x0, &(0x7f00000005c0)}) r9 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)="1efad03a989ab314d21ffa0d2346650f44168763f5ffd919990f3dd1f4f6bd76cf16e6f801aad734728f81596125151494393bf76dfc0b313e49e7e98d79b3391e062bce0f22af5aeb68bb4d59484acd83e2e7ef880d6a28345ae6e407cc82f65299766c17ae7fec210a429e89937c9d050cb7d7133c80a68b6d40f0ffcc42ccad09903a2bd7852ea68109f44510b1ebf8949a3c928e5ec8b56f59f30aecf5540578c4afa76bb46fe8b373272eec8d9754bdb993621e303afb2e95eacf4288dffc92f1a3078cae753a1c412c6a6751675948cf8f57daa844f5a6932550a40e3fa0632a", 0xe3, 0x0) r10 = add_key(&(0x7f00000003c0)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$unlink(0x9, r9, r10) 03:59:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x50, r0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x3}, 'syz0\x00'}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/24, 0x18}, {&(0x7f0000000180)=""/22, 0x16}], 0x2) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 03:59:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x100000000000000) [ 394.018721] input: syz0 as /devices/virtual/input/input20 [ 394.115376] input: syz0 as /devices/virtual/input/input21 03:59:39 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffefff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x88e, @remote, 0x33f}, @in6={0xa, 0x4e22, 0x2, @mcast1, 0x3}, @in={0x2, 0x4e24}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e23, 0x10d1, @mcast1, 0x3d}}, 0x200, 0x7, 0x2, 0x6, 0x17f5e32e2f4c3fff}, 0x98) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x6) getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'security.', '\x00'}, &(0x7f00000002c0)=""/17, 0x11) 03:59:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xffffffff00000000) 03:59:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xe, 0x20000102000007) 03:59:39 executing program 3: r0 = gettid() r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = syz_open_procfs(r0, &(0x7f0000000140)='map_files\x00') fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) getdents(r2, &(0x7f0000000200)=""/143, 0x29) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x100000a, 0x10, r2, 0x100000000) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x2, 0x1) 03:59:39 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 394.482163] overlayfs: failed to resolve './file1': -2 03:59:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x37}) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x20, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000180)={r2, &(0x7f0000000100)=""/65}) accept4$packet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x14, 0x0) 03:59:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) write$P9_RATTACH(r2, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x8, 0x2, 0x6}}, 0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000001280)=0xfffffe46) sendmmsg(r1, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 03:59:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x5000000) 03:59:39 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) userfaultfd(0x80800) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000019c0)) 03:59:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x2000000) 03:59:39 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x18000, &(0x7f0000000000)) mount$9p_virtio(&(0x7f0000000000)='/dev/loop', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x444, &(0x7f0000000200)={'trans=virtio,', {[{@cachetag={'cachetag', 0x3d, ')+GPLsecurity\\['}}, {@fscache='fscache'}, {@msize={'msize', 0x3d, 0x6720778b}}, {@cachetag={'cachetag', 0x3d, 'ppp1ppp1l^,:'}}, {@noextend='noextend'}, {@uname={'uname', 0x3d, '/dev/loop'}}, {@aname={'aname', 0x3d, 'iso9660\x00'}}, {@nodevmap='nodevmap'}, {@cache_loose='cache=loose'}, {@mmap='mmap'}], [{@subj_type={'subj_type', 0x3d, '/dev/loop'}}, {@appraise='appraise'}]}}) 03:59:39 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) dup3(r0, r2, 0x80000) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000040)=0x7) r3 = getpgrp(0xffffffffffffffff) sched_setattr(r3, &(0x7f0000000080)={0x30, 0x7, 0x1, 0x1, 0x3, 0x9, 0xf8e1, 0x7ff}, 0x0) close(r1) 03:59:39 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x3ff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x4b564d03, 0x1]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000180)=ANY=[@ANYBLOB="1020000800000000ffffff7f0031fbd09dd7d7d390c59119ae9fc9fd0000000000000000000000b381852dbe6c0eff3903a832c75f2d5f588d9a35b2828928f9acb0973dd32fbfc1f0bc6a193e54945fd918e2ccd0527500000000381980845c2646"]) r4 = fcntl$dupfd(r3, 0x0, r1) getsockopt$inet6_tcp_buf(r4, 0x6, 0x1c, &(0x7f0000000200)=""/98, &(0x7f0000000000)=0x62) 03:59:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x14, 0x20000102000007) 03:59:39 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)="153f620a9b") r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x6, {0x2, 0x4e23, @local}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e24}, 0x200, 0x16063610, 0xc0, 0x7ff, 0x9, &(0x7f0000000000)='bridge_slave_1\x00', 0x263, 0x8, 0x1}) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xff4c) fstat(r1, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000001c0)='net/igmp6\x00') close(r0) [ 394.752592] print_req_error: I/O error, dev loop2, sector 64 [ 394.792060] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 03:59:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) getgid() write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) ftruncate(r0, 0x3) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x6, 0x0, 0x0, 0x401, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x725c, 0x3, 0xd3d, 0x0, 0x10001, 0x200, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffc01, 0x0, 0xff, 0x4, 0x0, 0x200, 0x0, 0xfffffffffffffff7, 0x3, 0x3, 0x85f0, 0x2, 0x10000, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000380), 0x4}, 0x2000, 0x83, 0x98bf, 0x6, 0x7, 0x5, 0xffffffffffff8317}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000140)={0x0, 0x33, &(0x7f0000000280)="ed40b5d9da45d7792d7077523052a2808ba2d121c3a20a6c78dcfe6318e909ebb1eeb43b96c99d3305e21e14b1a5fe819e13be"}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:59:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x80ffff) [ 394.843616] 9pnet_virtio: no channels available for device /dev/loop [ 395.024140] 9pnet_virtio: no channels available for device /dev/loop 03:59:40 executing program 2: r0 = socket$inet6(0xa, 0x1200000000000002, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)) socket$inet(0x2, 0x805, 0x756d) 03:59:40 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x250200) prctl$setfpexc(0xc, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{}, {}, {}]}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x113, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @ib={0x1b, 0x101, 0x10001, {"b89b74cf9247400a88aaf8fff53e7a4e"}, 0x3ff, 0x800, 0x20}}}, 0x90) close(r3) 03:59:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x1000000000000) 03:59:40 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x12f, 0x0, 0x100000, 0x7, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00', 0xfffffffffffffffe}, 0x15f) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2000011, 0x0) ioctl$TIOCNXCL(r3, 0x540d) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x22ad6ca2, 0x7f) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={0x0, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000001100)="47034c5c2a5e276d643573755e656d306d6435739c90348ba739e0d201897a5a756d003d5630ec8315bd76531f4035c2eee96d0dc731fec890adecb785ceafd23699165bc2e410189bb8a9227a115f11d2b8357da0b244b7edd0cf36390105b91c65b22e1779dfa44d7dfe7cfd2bc1300312fdc6711448b2c060336908ef530db74f3405afb64a9f80a16f2aaa9825d3a5cfc1b4606c92fb743aba3ab273560b309231e8da76a84c28382d00daec6e69fc5fe1bc0ef9c0e7161db54e34d79cc3fab31562ce60878a6553392e999aa55830efd746ea5bda5e55612a285a23dc01a664eba7efcb7ff01b510f195b5f303a8e9cd71564ab9a00", 0x4) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r7, 0x1, &(0x7f0000000580)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r3, &(0x7f0000000800)="ca4d01a556a38bdba6a973757d83b72db7a4dc63b899b8d1baa0107cb4ebb94a084ea9c7901bb60e2ed72a06c220943bb6714a8a992146589b3877774138c48ca2ddf02bd042e9c9a9ad0a46d06cc6e0582464d237dc30f145188949f03e56a407224b55bf72b84689d074a958d8365426bec620501864b12c6464ea72e87b4dfd16a45cfbc3b77fe92bbf14ffc862e6a6e6562b5ada557455cf5748347559f01d8382a4d7fffec585b79b7355951bf512893ffb3e8c07b80860442cc5517ed8b31549620916e338a697a8b7d898567b5b6f5670de84366ce1b7e56c57a04f4343b11b48f1ff180c5b", 0xe9, 0x5, 0x0, 0x1, r6}]) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r2) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) sendfile(r5, r6, &(0x7f0000000380), 0x2000005) 03:59:40 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getgroups(0x400000000000028c, &(0x7f0000000080)=[0xee00]) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)=""/37, 0x25}, {&(0x7f0000001c80)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/160, 0xff81}, {&(0x7f0000001ec0)=""/156, 0xfffffe10}], 0x4, &(0x7f0000002000)=""/112, 0x70}}, {{&(0x7f0000002080)=@xdp, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/124, 0x7c}], 0x1, &(0x7f00000024c0)=""/85, 0x55, 0x1}, 0x7f}], 0x2, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x80000001, 0x0, 0x10000}, &(0x7f0000000040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007180)={0x0, @broadcast, @broadcast}, &(0x7f00000071c0)=0xc) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000600)=ANY=[]) preadv(r1, &(0x7f00000017c0), 0x8c, 0x0) 03:59:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x900000000000000, 0x20000102000007) 03:59:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) munlockall() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="810000007d020000006a005bec08000000040200000001000000000000000000ff6be57cebbc814bd577c4cf9d065201100008000000fdffffff0100008000000000070073656c696e757809005e657468306c6f3a2c01005b0d00256f786e65743073797374656d776c616e3170707030020025405710a17bdd000000008100000000000000000000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5], 0x81) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x401, 0x400}, 0x8) 03:59:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x200000000000000) 03:59:40 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x28be}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x404000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000080)={0x4, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{}, {}, {}, {}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000100)={0x101fd, 0x0, &(0x7f0000ffc000/0x4000)=nil}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$TCXONC(r1, 0x540a, 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 03:59:40 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0), 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f0000000000)=""/56, 0x38}, {&(0x7f0000000040)=""/70, 0x46}], 0x3, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0x4008af03, &(0x7f0000000100)=0x40) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 03:59:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x18000000, 0x20000102000007) 03:59:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xf6ffffff00000000) 03:59:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x180800, 0x20000102000007) 03:59:40 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x12f, 0x0, 0x100000, 0x7, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bridge_slave_1\x00', 0xfffffffffffffffe}, 0x15f) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount(&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2000011, 0x0) ioctl$TIOCNXCL(r3, 0x540d) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x22ad6ca2, 0x7f) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={0x0, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x2) r6 = memfd_create(&(0x7f0000001100)="47034c5c2a5e276d643573755e656d306d6435739c90348ba739e0d201897a5a756d003d5630ec8315bd76531f4035c2eee96d0dc731fec890adecb785ceafd23699165bc2e410189bb8a9227a115f11d2b8357da0b244b7edd0cf36390105b91c65b22e1779dfa44d7dfe7cfd2bc1300312fdc6711448b2c060336908ef530db74f3405afb64a9f80a16f2aaa9825d3a5cfc1b4606c92fb743aba3ab273560b309231e8da76a84c28382d00daec6e69fc5fe1bc0ef9c0e7161db54e34d79cc3fab31562ce60878a6553392e999aa55830efd746ea5bda5e55612a285a23dc01a664eba7efcb7ff01b510f195b5f303a8e9cd71564ab9a00", 0x4) syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r7, 0x1, &(0x7f0000000580)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r3, &(0x7f0000000800)="ca4d01a556a38bdba6a973757d83b72db7a4dc63b899b8d1baa0107cb4ebb94a084ea9c7901bb60e2ed72a06c220943bb6714a8a992146589b3877774138c48ca2ddf02bd042e9c9a9ad0a46d06cc6e0582464d237dc30f145188949f03e56a407224b55bf72b84689d074a958d8365426bec620501864b12c6464ea72e87b4dfd16a45cfbc3b77fe92bbf14ffc862e6a6e6562b5ada557455cf5748347559f01d8382a4d7fffec585b79b7355951bf512893ffb3e8c07b80860442cc5517ed8b31549620916e338a697a8b7d898567b5b6f5670de84366ce1b7e56c57a04f4343b11b48f1ff180c5b", 0xe9, 0x5, 0x0, 0x1, r6}]) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r2) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) sendfile(r5, r6, &(0x7f0000000380), 0x2000005) 03:59:40 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) 03:59:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x80ffff00000000) 03:59:40 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getgroups(0x400000000000028c, &(0x7f0000000080)=[0xee00]) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)=""/37, 0x25}, {&(0x7f0000001c80)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/160, 0xff81}, {&(0x7f0000001ec0)=""/156, 0xfffffe10}], 0x4, &(0x7f0000002000)=""/112, 0x70}}, {{&(0x7f0000002080)=@xdp, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/124, 0x7c}], 0x1, &(0x7f00000024c0)=""/85, 0x55, 0x1}, 0x7f}], 0x2, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x80000001, 0x0, 0x10000}, &(0x7f0000000040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007180)={0x0, @broadcast, @broadcast}, &(0x7f00000071c0)=0xc) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000600)=ANY=[]) preadv(r1, &(0x7f00000017c0), 0x8c, 0x0) 03:59:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) pause() r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x321000, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x1, [0x5]}, 0x6) 03:59:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xf6ffffff) 03:59:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1300, 0x20000102000007) 03:59:41 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000140), &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000040)={0x2}) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000280)={{0x2, 0x7, 0x3a59, 0xfffffffffffffc00, 'syz0\x00', 0x10000000000}, 0x4, 0x10000441, 0xd5, r4, 0x4, 0x7, 'syz1\x00', &(0x7f0000000240)=['\x00', '/\x00', '/group.stat\x00', 'GPL\x00'], 0x13, [], [0x5, 0x6d, 0x0, 0x5]}) close(r3) 03:59:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0xffff8000) 03:59:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x2) 03:59:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x19000000, 0x20000102000007) [ 396.442270] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x1000000) 03:59:41 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getgroups(0x400000000000028c, &(0x7f0000000080)=[0xee00]) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)=""/37, 0x25}, {&(0x7f0000001c80)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/160, 0xff81}, {&(0x7f0000001ec0)=""/156, 0xfffffe10}], 0x4, &(0x7f0000002000)=""/112, 0x70}}, {{&(0x7f0000002080)=@xdp, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/124, 0x7c}], 0x1, &(0x7f00000024c0)=""/85, 0x55, 0x1}, 0x7f}], 0x2, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x80000001, 0x0, 0x10000}, &(0x7f0000000040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007180)={0x0, @broadcast, @broadcast}, &(0x7f00000071c0)=0xc) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000600)=ANY=[]) preadv(r1, &(0x7f00000017c0), 0x8c, 0x0) [ 396.486718] Error parsing options; rc = [-22] 03:59:41 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = getpgid(0xffffffffffffffff) syz_open_procfs(r2, &(0x7f0000000040)='net/ipv6_route\x00') 03:59:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x3f00) 03:59:41 executing program 0: syz_emit_ethernet(0x7b, &(0x7f0000b88fae)=ANY=[@ANYBLOB="0180c2000000f3aa20259cdb86dd600500080045110000000000000000000000ffffffffffffff0200000000000000000000000000010420880b000100006c00000800000086dd080088be00000000100000010100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], &(0x7f0000efe000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl$VT_RELDISP(r0, 0x5605) 03:59:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfffffffe, 0x20000102000007) 03:59:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0xfffffffffffffff7, @ipv4={[], [], @multicast2}, 0x8}}, 0xc3, 0x1000, 0x8001, 0x9}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x919}, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:41 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80000000, 0x4040) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000200)={0x7, 0x0, [{0x4, 0x3, 0x0, 0x0, @sint={0x9, 0xde}}, {0x6, 0x2, 0x0, 0x0, @irqchip={0x3, 0x10001}}, {0xe000000000000000, 0x7, 0x0, 0x0, @irqchip={0x900000000000000, 0x4f}}, {0x8, 0x2, 0x0, 0x0, @irqchip={0x3, 0x7}}, {0x0, 0x1, 0x0, 0x0, @sint={0x1822, 0x4}}, {0x100000001, 0x4, 0x0, 0x0, @sint={0xfffffffffffffff8, 0xfff}}, {0x8, 0x1, 0x0, 0x0, @sint={0x0, 0x8}}]}) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) 03:59:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x11, 0x20000102000007) 03:59:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xfff, 0xfffffffffffffffd, 0x929e12073d6f1692, 0x0, 0x3, [{0x100000000, 0x2, 0x9, 0x0, 0x0, 0xc00}, {0x400, 0xffffffff, 0x0, 0x0, 0x0, 0xe}, {0x1, 0x80, 0x7}]}) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x5, 0x82) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400, 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7, 0x80) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8002000004) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:41 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r0) epoll_create1(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x202100, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 396.945305] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.958365] Error parsing options; rc = [-22] 03:59:42 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x7, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000f600bd796f69c02d434c402a825fa4f3096de251439acebd05d3670600000000000000cd5824b7e4e6a80ad11533000000000000000000000000"], &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000300)={0x1, 0x401, 0x10001, 0x9, 0x1a, 0x2}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x18) r2 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000100)={@mcast1, 0x0}, &(0x7f0000000340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', r3}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback, 0xffe0}, @in={0x2, 0x4e23, @local}], 0x2c) getresgid(&(0x7f0000000180)=0x0, &(0x7f0000000400), &(0x7f0000000440)) lchown(&(0x7f0000000140)='./file0\x00', 0x0, r4) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x9, &(0x7f0000000040), 0x4) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000280)=0x8) 03:59:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:42 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0xfe48, 0x0) accept4$unix(r0, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x80800) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2f, 0x80) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100)=0x1ff, 0x4) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000000c0)) socketpair$unix(0x1, 0x800000000001, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4e) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000140)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:42 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) r2 = socket(0x12, 0xa, 0x5f0c17dc) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f00000000c0)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = dup(r1) r4 = fcntl$dupfd(r2, 0x406, r0) openat$cgroup_ro(r4, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10cb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r5) setsockopt$inet6_int(r3, 0x29, 0xef, &(0x7f0000000040)=0x503, 0x4) 03:59:42 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0xe) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r1, r2) lseek(0xffffffffffffffff, 0x0, 0x4) [ 397.310217] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.364917] Error parsing options; rc = [-22] 03:59:42 executing program 1: r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)={0x8}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={0xfffffffffffffff7, 0x0, 0x869, 0xfffffffffffffffa, 0xd0d}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000f, 0x81813, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x8207c, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000240)=""/4096, &(0x7f00000000c0)=0x1000) 03:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf5ffffff00000000, 0x20000102000007) 03:59:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xfffffffffffffffd, 0x401, 0x0, 0x0, 0x6, 0x0, 0x7, 0x9, 0x300000000, 0x11b}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(0xffffffffffffffff) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}}, &(0x7f0000000540)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000580)={0x7fff, 0x10000, 0x8000, 0x3, 0x202000000, 0x800, 0x0, 0x58, r5}, 0x20) setgid(0x0) r6 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10000000) r7 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x30e, 0x40800) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000280)=""/91) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7fff, 0x200000) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) dup3(r0, r6, 0x80000) ioctl$GIO_SCRNMAP(r7, 0x4b40, &(0x7f0000000300)=""/233) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000400), &(0x7f0000000440)=0x14) 03:59:42 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000040)) prctl$intptr(0x1e, 0x0) 03:59:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000540)={0x7fff, 0x3a9, &(0x7f00000003c0)="325f6e0753c85dd1a8feb683b25d8fcb6afd79eff8c1429452d9bfca19ca725c0305a8ea59186c3e1997c0d606c197589a07114369dcd739718c765301670419cee4fe9e829958a3638222bf2ec94d2624e364b8656d8addc8345f43502ee975caec725056f9e1564144769afc9a1ec1bc63d462fb61aff448468d301b05153b172077822657e95cc278ccb8", &(0x7f0000000480)="a1251bc4d8941adbe022a4c69e81019a4615e02a6978701963a8b6562498b87b1b9d9631e8e7670ee2b2ee190431b6d9466627159a180797f752eb79498358ee2094168cbd501905a7834f503c9519d04d044785c47f08b631318c41f423bfa6793c59cf073e8d4a174b1dd50d20160b35e05aa96f095264d620d4e66c9483c23a7dcfb98147a2a1d675cf3e9883558c2def6ece4699", 0x8c, 0x96}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)="8b734ac1ce5f5248fa6e31483f736e24c0cf4916eafde808fa1de0aa0f10127261301dddd4e6a2d59618b680c3762a4101bbc77406880800772d876fb8d4151dedd1ded15baf241dd326e9a76c4ab1ca1ae391e2426f8bab43fe41214a707736d8e98b0dfb94c3") getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000380), 0x2) io_submit(0x0, 0x2, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x6, r0, &(0x7f00000000c0)="f814ecafa19627cfd820b94232a321e8de594b9377d5893bb5c848fbaa8efafe1e5292311dee2ed1fbf6a365b8ae935270b05dfeac70513e408f214cb6091951091d429466746e42e372d92871719e6c2f58ad2abc4c660c3fb68fd4780888fd95c315377433f9a794cb3f2815c711510096dfd05b88a6915761ddd1f217f0263ad39ab6bb3be8a6559a93553c4385235c00564ac83216f6e478bd464ab6fdbb6e8dfc052be8d7929ede2ee4c3644a2a9a27fae9c0edabd55cf24c57fd13a0f05cfb32272d9d3a88b625e020bff7f4b4b226efda5f0820ef6a45dafcd2bb57b5c7435a08fd33", 0xe6, 0x2, 0x0, 0x1}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7f, r1, &(0x7f0000000200)="e1ffa32e9e2303d1cca96101c6338879bd69572eaa70f1f970a752145675ae941ae1df6274c6871cba428fa33ff3542138d0bd087cfb62c05c5d55bef60ee2", 0x3f, 0x56b, 0x0, 0x1}]) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x7, 0x2, 0x7fffffff, 0xa, r2, 0x82a3}, 0x2c) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000340)=0x1ff, 0x2) 03:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xffff000000000000, 0x20000102000007) [ 397.640225] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 397.676623] Error parsing options; rc = [-22] 03:59:43 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x18002) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000680)={{0x1, 0x400}, 'port1\x00', 0x41, 0x0, 0x8000, 0x0, 0x0, 0x4, 0x8, 0x0, 0x1, 0x7fff}) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) socketpair$inet6(0x2c, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000007c0)=0x9) r3 = socket$inet6(0x2, 0x0, 0x0) vmsplice(r3, &(0x7f0000000200)=[{&(0x7f0000000480)="fbf82818e91e6da4a135421ee15ae4b9bacadcb7ba6df80e8f89b754d92c420c61fa0fcfd897f9b6d71c2fa11cf88a34dd336e99fd7263a31e51876bec9ecb68514dba102f896349675f9d71e63730f295149c69b1b9a0a9625ef02595e71c04882661decb8fd55950d110d813e90447a0e9e30d8e18caaded73a0d0792b711afd5a56b24a7134eeb7b347e4ca8ceeb0b6d8e33d1806ab59c0e62e02c67ba3cd91f1759f8d07cd658b4ef490d9fa910066aaf0b402b0b2d57c78c5904a60849b4968638b437e97d2e8b8fd14e59acb107052f85e0d9a4bc37dba1424c894a1b180", 0xe1}], 0x1, 0x2) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) tkill(r2, 0x11) r4 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x10000, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, r5}}, {@cache_loose='cache=loose'}, {@version_u='version=9p2000.u'}, {@aname={'aname', 0x3d, ')$&wlan0self,!nodev]'}}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x76, 0x39, 0x77, 0x36, 0x67, 0x65, 0x63, 0x75], 0x2d, [0x75, 0x75, 0x32, 0x30], 0x2d, [0x0, 0x0, 0x63, 0x33], 0x2d, [0x77, 0x36, 0x32, 0x77], 0x2d, [0x0, 0x0, 0x7f, 0x0, 0x31, 0x33, 0x33, 0x67]}}}, {@pcr={'pcr', 0x3d, 0x16}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfsdef={'smackfsdef'}}, {@context={'context', 0x3d, 'user_u'}}]}}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) uselib(&(0x7f0000000600)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000000c0)) 03:59:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7b) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x700000000000000, 0x20000102000007) 03:59:43 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() sched_getparam(r2, &(0x7f0000000040)) close(r1) 03:59:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 03:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1d000000, 0x20000102000007) 03:59:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000080)="0b3d457a6ba6cf9c06b619e648fb4c48281dd82ffef407be55fc3e02d5a5b384c42197bc3781330ae582af700f3843b4bac222787a23aba3ec533fec56f9734faf6a3592111eb2cd11ee6a96b579bef54cee6100396e8bfedf27bc453f08aa3750af524381283f251c4ec9872cbbd6eb1a85ba663cba17ff1b1d8e3870aa2e86cdc0b1a0514844f309e53182e47e2b64fcbefb9204", 0x95) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0xfffffffffffffe2d}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x20, 0x0) 03:59:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:43 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xc000000, 0x20000102000007) 03:59:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x26e1, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='cgroup.events\x00', 0xfffffffffffffff8) r2 = add_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="13af56", 0x3, 0xfffffffffffffffd) openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x181800, 0x0) keyctl$search(0xa, r1, &(0x7f0000000180)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x2}, r2) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x6b) io_setup(0x9, &(0x7f0000001300)=0x0) io_submit(r3, 0x1, &(0x7f0000000140)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000200)}]) 03:59:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x2b5) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000002c0)='\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x894f, 0x5, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x72, &(0x7f0000000380)}, 0x0) 03:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1100, 0x20000102000007) 03:59:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/24) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:44 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r1, 0x80000) r2 = fcntl$dupfd(r0, 0x0, r1) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:59:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) 03:59:44 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x42, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000400)=0x10000, 0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0xa, 0x805, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000340)={r5, 0x38, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x100000000, @remote, 0x81}, @in6={0xa, 0x4e21, 0x1ff, @loopback, 0xffff}]}, &(0x7f0000000380)=0x10) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2, 0x0) getpeername$llc(r6, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000200)=0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r7, 0x400442c8, &(0x7f0000000040)={r3, 0x3, 0x7, "f500655e1b7465e199f25a9b9c368ce5ba6edb56c703c0349385754cf5e736484fc83fe7945d5d7cfffdfeae35827dd4f4860e1e804a8b37f80c54885eaf93ab96c15f7598149ecba08606f5ecd61c7824a31b1064d1f90b9e7b76edcadff19b8ce63a17b9517f13752569f462d4170de88af850e2690301087829d1e1cd4d28c65f9e648ccc536d67c38f442902286305b288da0008548f8f830f3146939256705074c169"}) close(r8) 03:59:44 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)=0x3) sendmsg(r0, &(0x7f0000000c00)={&(0x7f0000000b00)=@rc={0x1f, {0x99, 0x7, 0x7, 0x0, 0x2000000000}, 0x7ff}, 0x80, &(0x7f0000000bc0), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="7800000000000000000000000080000097bf37a14a286263da5e784c01f46abd78acfefb80fb7e8179d8e325a192c622881c139941486564eebac925fc3680b2935e4d277030659d28c2d2dad9eb16ef6036a1aeaf54e8688c587098bbb4df5dc6ef4a5321203b1ddd10634565b9225ae5bf5b4b00000000"], 0x78, 0x800}, 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) accept4$packet(r0, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000bc0)=0x14, 0x800) bind$bt_hci(r0, &(0x7f0000000c40)={0x1f, r2, 0x3}, 0xc) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r5, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r5, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(r4, &(0x7f0000002580)={&(0x7f0000002480)=@xdp={0x2c, 0x0, 0x0, 0x32}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002500)}], 0x1, 0x0, 0x0, 0x800}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r5, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) recvmsg$kcm(r0, &(0x7f000000aa40)={&(0x7f000000a840)=@can, 0x80, &(0x7f000000aa00)=[{&(0x7f000000a8c0)=""/56, 0x38}, {&(0x7f000000a900)=""/173, 0xad}, {&(0x7f000000a9c0)=""/41, 0x29}], 0x3, 0x0, 0x0, 0x5}, 0x40010101) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r7, 0x6, 0x8}, 0xc) r8 = fcntl$getown(r1, 0x9) ptrace$getregs(0xc, r8, 0x8, &(0x7f0000000d80)=""/166) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000540)="bd40b28b79078fa8f16e09dba883d34b85882396eaf58995b90dbc7b1a041d14e2bc18f8892798b6024d6aae5110361b909e7a2ab66135247dda03cb06ad82f4f4e9c2cc3c0c800d9e0c300a5b5966df4a89aba438a45480c88dc704911e2ca18c58938d7e9a0b6cff532953bb9d530cea49b3a44f6fabc12c4f597845a13dd250a6e28c8b3771720c82dc9846d78741ed265b549157e23e78cb42c5b297aabc44a17b6edf78ef9fe2cf386aa5e0abbe3379a9ae4a1fb3d942ad3eae29b9cb08410a3cd3c13904720ee9fb416f96fda3091943c07afc2448d510e60152d630a01381296ce9a36269d37b8e936d02955a263ce43d3903cc3c28ffd9a31a77552b6d159751da28bdc5ebec9ed45a63ca7a1dce7f323ab14dccd7feda9b74be83200ab2f6f7413b244dfc49debb821b6798b9267a6086a23eb1dfb9614a7ef4a5cf8b95fd59be0c2165bde32f9f752c41e818a7f60d3af516cb4538e39217cf15052e2286c1aeda94b309e9d4883e7035a0c93c37ca926d1028a3eabecfda94f175472cc4bdf18a99c4fbc29fba3e31c3749da8e6c28d0845dc0d9883f6251428364cb1005e763a1a17a58fc135396fa9cb96e7257c5f9ef140164361dbdb2d877126bb39143259e1bdea78cbe892b58650dd3be219914a355c9245f1e8a6ee8706094d58eb154af019d281095246ba3b9ead4ae664feee0e0bef626fa1255f2c8a373118438bbc84ac011dcba9d04495d3720f62320a6da471388b68ae2a18a94f6688fb2afef36578142e4bca80f0ae78dc5e70ebd300179734c3d666499ea60c0098f567a847288f7e82b23ec2f5a0a91d548b776559c164473b8d51cdd83dfe28ca327015c99d073a4f148c15ea1a9a8d51b971b7376f4dc1c665ef8d5b85185ce135c0f22b2412760d980fe011af8214c1567b1f26ae169ffe8ea567c025b85e607422ce0d16e3e93ea2de508cf373c0f8563902cabae3a56d935254661036242a75a3176b0af19340961c782e3a71bad9608884de1a0d0c44f11189cf87d6f6bfc86d5003bc42df6edd38bf2e30742d64a2e943f88968e41447bbeaf1777f4028b8c6dcee8ef1db28cc1482d11d6003e0df62623f95c65a40ccf5639c4dd6ddaee3236b0edfb35a34ccd74428bbb369a9487527223c3b89fa309da0b091c1f906cb598f366aea12c2574368dff9cd49e5d52e6a7483518e5825cdb517200dbeb5a565a0221fad51e50fe7b498535acda8fc6c216296750514ea894a990a254d8449faacdc856c979f81e80bf4f33e3fd742bb6330dd04cbd757170386e03b17111b1587408c6bface9e04d2a9a93e5f556daf18e5d95c1cccd0b9ae6592219547b90414977ec4cc7af5d2c38a06da735bf507112794addb520f71b16aa4819d7f9751131da216d0abff30434c43257edd82557695e0cadb6365034ce7657c262ec218245e102ff8a54a802b93bd0d6766a51864cd2ea4343c03a7420943431c3cf511bb43fc803f26285eaae9ec2a12c0c8746da16b71f84c1c72c6cc2fc501c1955ec0173c0fbc924c7658db4f3e0be06ac9489d42594d82637da3956930fe622860ebef21856e5901f6114bea931d20e7b0d344945738b9933a005ee7b9e3c9d2fb6087dbaaa450df6a79f811e784bd6f1dfbc374b9306d06cb87b201f4d6343feb038cbf5b867e151a0ca42ffd8fa388816f49a5d3a7871f6cdc0fa8d20891c58278b6ec13ac3058e5a4c90020734eb8703c84e53f8a326a822e48a263bca81ce73336390abb7361ef8261ecb843f4fab678c23441155f5166f16804a185f20051628d79c9087d42b58f3f5a25747c67c5e3de41b59c8bf89ee63bcae138dc09bc836ebec2e4cb597cd67d7afd1d7cc579efd65109c43038b12d31bfe3e9da2d187829e34be0d685dba1f7415c29a3aad9564a7f2023034e3768cf5a8f67c3a646b7d68e1d811a97e54ec0f66c11dec48ba081b57cc53a4e65925e22c8", &(0x7f0000000280)=""/132}, 0x18) sendmsg(r3, &(0x7f0000000d40)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x6d4, @remote, 0x6}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000c80)="0cc3ad51b2199efc6259f950d8fddc82275da42c07ee760f449fe2342b5617940919334e39bb60025fd31f322482338cd0e561e4240fdc72327981ac5b47f384c51b6137a3f54613", 0x48}], 0x1, &(0x7f0000001180)=[{0x50, 0x109, 0x1, "73b0753bf683cfefab826e93e08569293c877e3496f8bc11b3a036fe3e57ced45161912cad5ad53a5b441e1615f9f2d9eb52d8724f08fd032cd571"}], 0x50, 0x400c011}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r6, 0x3, 0x18}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='proc(.[:/@\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) 03:59:44 executing program 2: sched_setaffinity(0x0, 0x4, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)={0x0, 0x4f, "36d4b6f24fd644c18311925a5f07084dfb8b7181c7c62a61f1761c840c9aba96cd14dca98075338f2c9cb74adb841257e1f643e2654603f1cebccb269d0a8dfc5df37d08e3dc8cb5a23f718631382c"}, &(0x7f0000000740)=0x57) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x0, 0xfffffffffffffffc}, 0x90) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='vegas\x00', 0x8377c82a1d841f) sendto$inet6(r1, &(0x7f0000000280), 0x2945360407270a84, 0x20000004, &(0x7f0000000080)={0xa, 0x4e23, 0xff001600, @empty={[0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0xe2778f615472d8a8) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) 03:59:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000000000000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1500, 0x20000102000007) 03:59:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1, 0x42) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000140)=0x1f, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0xfcd4) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="57b355041a2d37aaa3f6f20d45261500000065ffff"], 0x15) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000006e40), 0x0) write$FUSE_POLL(r2, &(0x7f00000001c0)={0x18, 0x0, 0x2, {0x3}}, 0x18) r3 = getpgid(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:hald_sonypic_exec_t:s0\x00', 0x29, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r3) ioctl$VT_WAITACTIVE(r1, 0x5607) [ 399.538899] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) epoll_wait(r2, &(0x7f0000000240)=[{}, {}], 0x2, 0xca) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000100)={{0x2, 0x3, 0x78d00000000, 0xbd69, '\x00', 0x40}, 0x1, 0x20000000, 0xff, r3, 0x1, 0x0, 'syz1\x00', &(0x7f00000000c0)=['/dev/snapshot\x00'], 0xe, [], [0x6, 0x5, 0x7, 0x4]}) 03:59:44 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffff, 0x8100) write$FUSE_POLL(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0xfff, {0xfffffffffffffffa}}, 0x18) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 03:59:44 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffc, 0x40) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) capset(&(0x7f0000000240), &(0x7f0000000280)) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0x40047451, &(0x7f0000000240)=""/174) [ 399.650332] Error parsing options; rc = [-22] 03:59:44 executing program 2: clock_gettime(0x3, &(0x7f00000000c0)) 03:59:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x1, 0x2, 0x1f, 0x4, 0x8, 0x1, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x3, 0x10001, 0x401}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1f00, 0x20000102000007) 03:59:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="bff185d9ca7ef1e3d7b3e3b5f11cdb7499e8e435593b8167b0bcfcfe548fbadd64abba878573f63084cf14b524030dd3b87c3e49fb0639fcedb0fcaf3d84692c4cada5bf3b87fae38feced2012cc47686fce5d20381461269c98353a9e3c0843e229b4c035c6de2373e9b94402ee634fe1546e0437b8bc587b16d7d751ba81e8a7f539adcda1a1b8f1d55b2ad69361ab17ef78f5b8e37cbbd2449ce3d66413984b1fba08082a65c24672c107fa407600", 0xb0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000001c0)='keyring\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0xc00, 0x100) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x204200, 0x0) syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x9, 0x80080) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x509200, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x5, 0x2) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:44 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet6(0xa, 0x0, 0x100000000, &(0x7f0000000040)) [ 399.912583] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 399.930849] Error parsing options; rc = [-22] 03:59:44 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x7d) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x40, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) syz_open_dev$midi(&(0x7f0000009ff5)='/dev/midi#\x00', 0x2, 0x202) close(r0) 03:59:44 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x8000000000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, &(0x7f00000001c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0x237, 0x0, &(0x7f0000000240)}) 03:59:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xc04000000000000, 0x20000102000007) 03:59:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x81, 0x22181) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 400.176144] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f00000001c0)={0x330, 0x2, 0x4, 0x100, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x9}, [@generic="cc33a8acca8f070496006fd71939623a636098cdbc0de1ea8a7191475245fb8b85fd4e4a3c144f0a50cd76447de1b73a7078cecf595b9d0cb8cde2d128815f19ee4e94fa88be3f294ddf33e63457a794d667c949209dcbeca50eff7148ed2d451a0896f32a8697e4d77c522350aeb7397fc2053f4822f4da2094e04205f7434cb568555bec970571915d1a16862ea436ef837c881a88c3f5e83980705dfddcd511f502699707f160354e8f1384dd370081b3de5ce01f7f4306975cd4ab4373429aaba6fdb99fc4c425ac34237668", @typed={0x14, 0x85, @str='wlan1,vboxnet0\x00'}, @typed={0x8, 0x86, @pid=r3}, @nested={0x208, 0x60, [@typed={0x8, 0xf, @pid=r4}, @typed={0x8, 0x3f, @fd=r0}, @generic="1cb7cf9d0474ca3a66a14868990dc6e3327a36fb18ddb608fc2628a01b114262515ff0c3883cd758defc69c6a88d94f8640e099d02b2230270bfa03ae175cea80a1e5933d7c1c83fed02cdd91e448588ddea8f83d3c658f850d97d5fecc349bbb81987345c18b0f52620a1d4cd52ce8c0ad853efcdf231c916baaacac5e24a64aef721c5ee26e71d508de07fb21399c25445579c0ca45f2ee10dfc5c488564d6ad18fcb3e7f096945daebf4a14d22fb4064a", @generic="b979ce4c5bcb4720c6fb4e00853d2bdf4580ee8721abb2dc52329ec5594d7ae10653fb446ccb3694ca82f580af9bec5708feb955244d2427a2dab892a543efbb9972e09fc0cd6382967e8610c563cba9ace08044ded113314db41b9152bdfe4e08fe317956dd843294ed9e883ce87ed611545d186ce8354e82805890aa64d854c93aeaaea4c96287595c602c0cbbd32c0ab7b902df97b97344b03108a2ec1540b8ac53b07f4a201e19d00b852b35cc9823d1a8c6c61dfb41a3fd", @generic="e9e090f92468c209f2ca562d6bbddb9fd2dcad0d1b7ea849a1df226c7720cb78404263ba128d2b4ffe286ddf58b3cbea398123a38837ab33304d0bffbee399b25745d6dccab6293df0c542571fe51d5ba6588ebf2a0a2c66725175c5fdead27d0e58b3a33b6928079209afb8284393c8c2e582d2668849d3804f13cbcb04a85f0b7b0bd74b0551"]}, @typed={0x14, 0x2a, @ipv6=@loopback}, @typed={0x14, 0x83, @str='/dev/snapshot\x00'}]}, 0x330}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) accept4$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x80000) ptrace$setregs(0xf, r3, 0x1, &(0x7f0000000580)="fcbd0f44525e3c1a23a2d54530d69639a53497524d0d") [ 400.250237] Error parsing options; rc = [-22] 03:59:45 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xd00000000000000, 0x20000102000007) 03:59:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 400.365907] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 400.398736] Error parsing options; rc = [-22] 03:59:45 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000000)={0x7, 0x4d, 0x2}, 0x7) fcntl$setpipe(r2, 0x407, 0xd01) 03:59:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 400.501746] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:45 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1ff) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0xf}}, 0x20) [ 400.550789] Error parsing options; rc = [-22] [ 400.683197] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 400.716241] Error parsing options; rc = [-22] 03:59:45 executing program 0: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet6(0xa, 0x0, 0x100000000, &(0x7f0000000040)) 03:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xe000000, 0x20000102000007) 03:59:45 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x9}, 0x8) close(r2) 03:59:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$getreaper(0x0, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 400.860684] binder: undelivered death notification, 0000000000000000 [ 400.903198] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 400.936072] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x500c2, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x6f48) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f00000000c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x9000000, 0x20000102000007) [ 400.953801] Error parsing options; rc = [-22] [ 400.961044] Error parsing options; rc = [-22] 03:59:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='\\&-keyringvmnet1\x00', 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000300)='rxrpc\x00', &(0x7f0000000340)={'syz', 0x0}, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair(0x5, 0x800, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="6b00000089721119ac7bc6933bc7935b3b2b73e9e8cf375894e6a4d63f65ea7d6c466628be1ddf0a1d67c7ae91ca08b1df1dc083c6e3d80bf7366717d591c3e7ed223449ac852c107e206364fe56eecb049bd53acb35e652b7f67836a2bf455f611da67c985e9adfb2a47aa769e66a"], &(0x7f00000001c0)=0x73) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000200)={r5, 0x33, "1001fef0fa7eed09533f7f528f4337f1660ac903ff87215f2ac2813335a858460088a94c579c59367434fb0ceb18b11c21d3e4"}, &(0x7f0000000240)=0x3b) getpeername$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1b000000, 0x20000102000007) 03:59:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") unshare(0x2000400) r1 = getpid() ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000180)={&(0x7f0000000080)=""/244, 0xf4}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0xa, &(0x7f00000001c0)=[{0x1ff, 0x100000000, 0x100000001, 0x5}, {0xfffffffffffffffc, 0x100000000, 0x7ff, 0x200}, {0xb05, 0x6, 0x4, 0xffffffff}, {0x100, 0x411b, 0x80000001, 0x7}, {0x10000, 0x1, 0x101, 0x1}, {0x4, 0x7, 0x10001, 0x8fe8}, {0x5, 0x4, 0x1000, 0x100}, {0x7fff, 0x3, 0x4, 0xed0}, {0x800, 0x3f, 0x3, 0x628}, {0x0, 0x9b54, 0x10000, 0x20}]}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x20000000000000a, &(0x7f0000000000), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x2, 0x188a}) 03:59:46 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x2) 03:59:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x40110, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 03:59:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x16000000, 0x20000102000007) [ 401.239925] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.274997] Error parsing options; rc = [-22] 03:59:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup2(r1, r1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={r3, 0xa9, "59fa1a5d6bc4bcc929f6ea33c7ac10f69e5700367b403f39d6d1937c8117eb3a682e97b2ba12bb569d228a61461dff14447b097411de5c2ae7be2b3ba4eccf2b471a3a8609e8cc1650fdc3bd1e3c02b51aa9168f30de5b4fed7d6b37f84f1af636b8efb0f9d34a1c852c66dcc9cfb2399c3d4d57612ef12401d67617265b3cdf0e60b2224074a05df34aac5f9b462c5c6fee362b8f780f1d117812e688f9863d0d166c68c5f98795fd"}, &(0x7f0000000080)=0xb1) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x3b}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2100, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x80000, 0xb7d, 0x80, 0x6, 0x6}, &(0x7f0000000300)=0x14) 03:59:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1f000000, 0x20000102000007) 03:59:46 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fffffff, 0x40000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f00000000c0)={0x0, {r1, r2+30000000}, 0x7, 0x18}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 401.568746] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:46 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000040)={[0x0, 0x100000, 0x10d000, 0x10000], 0x80000000, 0x80, 0x1}) close(r2) 03:59:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 401.615040] Error parsing options; rc = [-22] 03:59:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0xbbcb, 0xacf}}, 0x28) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5c, 0x101180) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x1028000, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x8000000, 0x20000102000007) 03:59:46 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x10000, 0x0) fadvise64(r0, 0x0, 0x1, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0", 0x4) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000063c0)=[{{&(0x7f0000000040)=@pppol2tpv3in6, 0x3a, &(0x7f0000000080), 0x5}}, {{&(0x7f0000000000)=@nl=@proc, 0xc, &(0x7f00000020c0), 0x0, &(0x7f0000002140)=[{0x10, 0x117, 0x4}], 0x10}}], 0x2, 0x0) 03:59:46 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000500)=0xc) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x8006, 0x0, 0x0, 0x0, 0x9917, 0x1000000f7ff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000002c0)={0x7f, 0xfffffffffffffff8, 0x5, 0xa7, 0x1, [{0x1, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x401}]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x5424, &(0x7f00000001c0)=0x1000) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@mcast2, 0x2, r3}) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000000c0)=r1) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0xfd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e21, 0x9, @empty, 0x8b6b}}, [0x2000000000000000, 0x0, 0x319, 0x1f, 0x7, 0x0, 0x8000, 0xff, 0xc9b, 0x8, 0xffffffff, 0x7, 0x0, 0x6, 0x3f]}, &(0x7f00000004c0)=0x100) write$binfmt_misc(r1, &(0x7f0000000540)={'syz0', "9476142d9fc809fe07fdcf34f4317a19b007d7e995d0039f69d9eac0f264699199161a8b446fb4434a57257e562fe671fa9627b2c270166983f0e3999261e182738dfb44b0ee2d1ab04c7d9146496a4f8ad21b82a3a2bf533aed83104aabb6c4ec5daee49bbb37f073b1725e5eb5953ea0bd8424476f6f7c7a060e3a1ae4de844c9b39b63d35d5466100b95363108ff9b7b19d7dc2a00cb6ab68a47de03d4677b5ce98d55c4eeaf05c211344249ad6f274f675ec2c7373da"}, 0xbc) unshare(0x40000000) 03:59:46 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x2) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000080)=""/48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 03:59:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xb000000, 0x20000102000007) 03:59:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 402.052458] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.124407] Error parsing options; rc = [-22] 03:59:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf00, 0x20000102000007) [ 402.145637] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 402.190408] IPVS: ftp: loaded support on port[0] = 21 [ 402.257125] Error parsing options; rc = [-22] [ 402.314942] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:47 executing program 4: socket$kcm(0x29, 0x5, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x2}, 0x7) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 402.360993] Error parsing options; rc = [-22] 03:59:47 executing program 1: socketpair$unix(0x1, 0x10000000000006, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000100)="6e452354a55d507d06b01366d7514b52bd0aea505b1291ff4c4adbe5780d6ecbdcffcc2a718957f9e4a2b1a07209405c8ad5c85c3523faf3604f721e09decc2b8a5cdabad8ab3f0895418a31e7d8b50a0774938a913ff730b1d0a91a") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@generic={0x3, 0x5, 0x7}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e) pipe(&(0x7f0000000380)) 03:59:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 402.500853] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.526831] Error parsing options; rc = [-22] 03:59:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1c, 0x20000102000007) [ 402.735062] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.755067] Error parsing options; rc = [-22] [ 402.840952] IPVS: ftp: loaded support on port[0] = 21 03:59:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:47 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000500)=0xc) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x8006, 0x0, 0x0, 0x0, 0x9917, 0x1000000f7ff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000002c0)={0x7f, 0xfffffffffffffff8, 0x5, 0xa7, 0x1, [{0x1, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x401}]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x5424, &(0x7f00000001c0)=0x1000) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@mcast2, 0x2, r3}) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000000c0)=r1) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0xfd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e21, 0x9, @empty, 0x8b6b}}, [0x2000000000000000, 0x0, 0x319, 0x1f, 0x7, 0x0, 0x8000, 0xff, 0xc9b, 0x8, 0xffffffff, 0x7, 0x0, 0x6, 0x3f]}, &(0x7f00000004c0)=0x100) write$binfmt_misc(r1, &(0x7f0000000540)={'syz0', "9476142d9fc809fe07fdcf34f4317a19b007d7e995d0039f69d9eac0f264699199161a8b446fb4434a57257e562fe671fa9627b2c270166983f0e3999261e182738dfb44b0ee2d1ab04c7d9146496a4f8ad21b82a3a2bf533aed83104aabb6c4ec5daee49bbb37f073b1725e5eb5953ea0bd8424476f6f7c7a060e3a1ae4de844c9b39b63d35d5466100b95363108ff9b7b19d7dc2a00cb6ab68a47de03d4677b5ce98d55c4eeaf05c211344249ad6f274f675ec2c7373da"}, 0xbc) unshare(0x40000000) 03:59:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfffffff5, 0x20000102000007) 03:59:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 402.970872] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.997591] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.014814] Error parsing options; rc = [-22] [ 403.034662] Error parsing options; rc = [-22] 03:59:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x600000000000000, 0x20000102000007) 03:59:48 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c, 0x800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4, 0x2, 0x3, 0x0, 0x4, 0x20, 0x4, 0x1}, 0x20) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getrlimit(0xf, &(0x7f0000000100)) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 03:59:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x9, 0x800) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x10400, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f00000000c0)={0x2cbe, 0x3, 0x0, 0x4, 0x1}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 403.185672] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.210306] Error parsing options; rc = [-22] [ 403.226947] IPVS: ftp: loaded support on port[0] = 21 [ 403.288819] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.342917] Error parsing options; rc = [-22] 03:59:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x300000000000000, 0x20000102000007) 03:59:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:48 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r1 = getpid() write$P9_RGETLOCK(r0, &(0x7f00000000c0)={0x2c, 0x37, 0x1, {0x0, 0x100000001, 0x200, r1, 0xe, '/dev/snapshot\x00'}}, 0x2c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:48 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x10000, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f00000002c0)={@dev={0xac, 0x14, 0x14, 0x12}, @broadcast}, 0x8) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0xa, 0x48, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f00000000c0)={{0x4, 0x8}, 'port1\x00', 0x9, 0x10004, 0xe81c, 0x1, 0x1ff, 0x9a2, 0x8, 0x0, 0x4, 0x8}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000200)=""/26, &(0x7f0000000240)=0x1a) close(r0) [ 403.647246] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.718721] Error parsing options; rc = [-22] 03:59:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000240)={0x0, 0x2000000001, 0x1, &(0x7f0000000300)}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000000)='bond_slave_0\x00') 03:59:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1e000000, 0x20000102000007) 03:59:48 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:48 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x4000) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:48 executing program 1: syslog(0x9, &(0x7f00000000c0)=""/209, 0xd1) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80240, 0x0) [ 403.908422] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.925850] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xb00, 0x20000102000007) [ 404.004725] Error parsing options; rc = [-22] [ 404.034972] Error parsing options; rc = [-22] 03:59:49 executing program 0: syslog(0x8, &(0x7f0000000780)=""/236, 0x672c786865f3be4) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xe3, 0x8}) r0 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x4dcf, 0x501200) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x32d3c3e497c7d8df) r2 = memfd_create(&(0x7f0000000080)='*}&posix_acl_access\x00', 0x6) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000600)=0x157) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000001c0)={r3, 0xa31e, 0x100000000, 0x3bd1, 0x6, 0x6, 0x8c7e, 0x1, {r4, @in6={{0xa, 0x4e21, 0x100000000, @mcast1}}, 0xffff, 0xe3, 0x3, 0x8, 0xfcc7}}, &(0x7f0000000280)=0xb0) 03:59:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:49 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100)=0x87, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r3, 0x7}, 0x8) 03:59:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x40000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r2, 0x20c, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xb39}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x60}, 0x1, 0x0, 0x0, 0x4085}, 0x1) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x88040}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x126, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4010}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:49 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 404.337612] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) sendmsg$nl_route(r0, &(0x7f0000001340)={&(0x7f00000000c0), 0xc, &(0x7f0000001300)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100001000000000000000000000000006280ba903da5c44d7c0870ea44185409ebc4222ce73c31e58db75a8a53b79b82e17afa11ffc9932d991854501b4554229c12ed76b4cd495372f90b1d83701e791251a48c2b22935610cd444df2b82fd24d81b29b2d34240b65faaf9f59d88269dea4d39296c1616abd46de321a", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012001000010069703665727370616e0000001400020008000200000000000800030000000000"], 0x48}}, 0x0) 03:59:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 404.414513] Error parsing options; rc = [-22] [ 404.424135] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 404.442136] netlink: 40 bytes leftover after parsing attributes in process `syz-executor0'. 03:59:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 404.525250] Error parsing options; rc = [-22] 03:59:49 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:59:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000008000)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000000), 0x396) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$VT_DISALLOCATE(r1, 0x5608) r2 = semget$private(0x0, 0x4, 0x80) semtimedop(r2, &(0x7f0000000040)=[{0x3, 0xe000000, 0x1000}, {0x2, 0xfffffffffffffffe, 0x800}], 0x2, &(0x7f00000000c0)) 03:59:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x2000000000000000, 0x20000102000007) 03:59:49 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 404.712634] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3, 0x400) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000100)={0xb, 0x80000000, 0x20}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000040)) [ 404.792618] FAULT_INJECTION: forcing a failure. [ 404.792618] name failslab, interval 1, probability 0, space 0, times 0 03:59:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfffffff0, 0x20000102000007) [ 404.832956] Error parsing options; rc = [-22] [ 404.874781] CPU: 0 PID: 16673 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 404.883330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.892694] Call Trace: [ 404.895327] dump_stack+0x244/0x39d [ 404.898986] ? dump_stack_print_info.cold.1+0x20/0x20 [ 404.904207] ? debug_smp_processor_id+0x1c/0x20 [ 404.908890] ? perf_trace_lock+0x14d/0x7a0 [ 404.913151] should_fail.cold.4+0xa/0x17 [ 404.917236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 404.922372] ? __f_unlock_pos+0x19/0x20 [ 404.926375] ? lock_downgrade+0x900/0x900 [ 404.930624] ? proc_fail_nth_write+0x9e/0x210 [ 404.935156] ? find_held_lock+0x36/0x1c0 [ 404.939259] ? perf_trace_sched_process_exec+0x860/0x860 [ 404.944733] __should_failslab+0x124/0x180 [ 404.949000] should_failslab+0x9/0x14 [ 404.952831] __kmalloc_track_caller+0x2d1/0x760 [ 404.957520] ? strncpy_from_user+0x5a0/0x5a0 [ 404.961949] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 404.967510] ? strndup_user+0x77/0xd0 [ 404.971327] memdup_user+0x2c/0xa0 [ 404.974884] strndup_user+0x77/0xd0 [ 404.978547] ksys_mount+0x3c/0x140 [ 404.982140] __x64_sys_mount+0xbe/0x150 [ 404.986137] do_syscall_64+0x1b9/0x820 [ 404.990036] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 404.995419] ? syscall_return_slowpath+0x5e0/0x5e0 [ 405.000364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.005220] ? trace_hardirqs_on_caller+0x310/0x310 [ 405.010249] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 405.015279] ? prepare_exit_to_usermode+0x291/0x3b0 [ 405.020313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.025180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.030380] RIP: 0033:0x457569 [ 405.033607] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.052518] RSP: 002b:00007fe37318dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 405.060242] RAX: ffffffffffffffda RBX: 00007fe37318dc90 RCX: 0000000000457569 [ 405.067527] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 03:59:50 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, &(0x7f0000000500)) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r0, 0x48, 0x0) lseek(r0, 0xffffeffffffffffd, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x100) accept4(r1, &(0x7f0000000100), &(0x7f0000000040)=0x80, 0x80800) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x7) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80000, 0x0) 03:59:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xa0401, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000140)={0x5b, &(0x7f00000000c0)=""/91}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:50 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x6, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xc9, 0x20900) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0x3, 0x3, 0x0, 0x1, 0xfffffffffffffffa}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) [ 405.074824] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 405.082101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe37318e6d4 [ 405.089383] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000003 03:59:50 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x40c, 0x20000102000007) 03:59:50 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x220000, 0x0) lseek(r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x4, 0x7, 0x9, 0x0, 'syz0\x00', 0x5}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10, 0x4, 0x2, 0x1}, 0x2c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 03:59:50 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80, 0x80000) accept$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000012c0)=0x6e) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000200)={{0x3b, @broadcast, 0x4e21, 0x2, 'lblcr\x00', 0x1, 0xa06f, 0x39}, {@broadcast, 0x4e21, 0x0, 0x561, 0x7, 0x100}}, 0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0xff) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000002c0)=""/4096, &(0x7f0000000100)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCXONC(r1, 0x540a, 0xffffffffffffffc0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000001500)={0x3, 0xbc5b000000000000, 0xc1da, 0x98, &(0x7f0000001300)=""/152, 0x21, &(0x7f00000013c0)=""/33, 0xf4, &(0x7f0000001400)=""/244}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 405.359851] FAULT_INJECTION: forcing a failure. [ 405.359851] name failslab, interval 1, probability 0, space 0, times 0 [ 405.393003] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 405.504654] CPU: 0 PID: 16700 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 405.513195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.522554] Call Trace: [ 405.525166] dump_stack+0x244/0x39d [ 405.528832] ? dump_stack_print_info.cold.1+0x20/0x20 [ 405.534043] ? debug_smp_processor_id+0x1c/0x20 [ 405.538727] ? perf_trace_lock+0x14d/0x7a0 [ 405.542988] should_fail.cold.4+0xa/0x17 [ 405.547065] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 405.552185] ? lock_is_held_type+0x210/0x210 [ 405.556613] ? save_stack+0x43/0xd0 [ 405.560265] ? kasan_kmalloc+0xc7/0xe0 [ 405.564189] ? __kmalloc_track_caller+0x157/0x760 [ 405.569040] ? memdup_user+0x2c/0xa0 [ 405.572784] ? do_syscall_64+0x1b9/0x820 [ 405.576873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.582260] ? __schedule+0x8d7/0x21d0 [ 405.586190] ? find_held_lock+0x36/0x1c0 [ 405.588714] Error parsing options; rc = [-22] [ 405.590292] ? perf_trace_sched_process_exec+0x860/0x860 [ 405.590315] ? lock_release+0xa10/0xa10 [ 405.604244] ? perf_trace_sched_process_exec+0x860/0x860 [ 405.609712] __should_failslab+0x124/0x180 [ 405.613958] should_failslab+0x9/0x14 [ 405.617777] __kmalloc_track_caller+0x2d1/0x760 [ 405.622470] ? strncpy_from_user+0x5a0/0x5a0 [ 405.626891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.632439] ? strndup_user+0x77/0xd0 [ 405.636259] memdup_user+0x2c/0xa0 [ 405.639821] strndup_user+0x77/0xd0 [ 405.643466] ksys_mount+0x73/0x140 [ 405.647023] __x64_sys_mount+0xbe/0x150 [ 405.651026] do_syscall_64+0x1b9/0x820 [ 405.654928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 405.660302] ? syscall_return_slowpath+0x5e0/0x5e0 [ 405.665239] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.670088] ? trace_hardirqs_on_caller+0x310/0x310 [ 405.675114] ? prepare_exit_to_usermode+0x291/0x3b0 [ 405.680146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.685008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.690198] RIP: 0033:0x457569 [ 405.693394] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.712802] RSP: 002b:00007fe37318dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 405.720517] RAX: ffffffffffffffda RBX: 00007fe37318dc90 RCX: 0000000000457569 [ 405.727806] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 405.735082] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 405.742352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe37318e6d4 03:59:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0xa, 0x800000000a, 0x1, 0x70bd29, 0x25dfdbfe}, 0x14}}, 0x20000080) 03:59:50 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200, 0x0) close(r2) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "ff0a810dff730db36793f1d65a11764e"}, 0x11, 0x0) 03:59:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fa) socket$bt_bnep(0x1f, 0x3, 0x4) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040)={{0x80, 0x1}, 0x59}, 0x10) [ 405.749625] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000003 03:59:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:50 executing program 0: r0 = socket$inet(0x2, 0x3, 0xe24b) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xc0000, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000001c0)={0x6, 0x80000000000004}) setsockopt$inet_int(r0, 0x0, 0xc9, &(0x7f0000000040), 0x4) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000200)=0x4) read$eventfd(r1, &(0x7f0000000240), 0x8) ioctl$TIOCSTI(r0, 0x5412, 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x6, 0x70, 0x3, 0xc7, 0xfffffffffffffff8, 0x2, 0x0, 0x7fffffff, 0x2800, 0x4, 0x3ff, 0x60, 0x0, 0x7, 0x5, 0x0, 0x5, 0x6, 0x7, 0x0, 0x9, 0x4, 0x1, 0x6, 0x5, 0x80000000, 0x7, 0x1, 0x8, 0x3, 0x4, 0x7fffffff, 0xfffffffffffffffb, 0x7, 0x3f, 0x6, 0x9, 0xffffffffffff0001, 0x0, 0x750, 0x3, @perf_bp={&(0x7f00000000c0)}, 0x8000, 0x6, 0x3, 0x3, 0x8, 0x6, 0x7ff}, r2, 0x3, r1, 0x8) 03:59:50 executing program 1: ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc2c00, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x6, {{0x2, 0x4e20}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x4, {0x2, 0x4e22, @remote}, {0x2, 0x4e23, @local}, {0x2, 0x4e21, @remote}, 0x10, 0x200, 0x7fffffff, 0xcd14, 0x7, &(0x7f0000000180)='ip6gretap0\x00', 0x8cc, 0x9, 0x7}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x180240, 0x0) [ 405.960562] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:51 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x40) [ 406.024151] Error parsing options; rc = [-22] 03:59:51 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:51 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x4000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000780)={0x75, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/242, 0xf2}, {&(0x7f0000000200)=""/161, 0xa1}], 0x2, 0x0) close(r3) 03:59:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x2, 0x4) 03:59:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xa1ffffff00000000, 0x20000102000007) [ 406.249922] tmpfs: No value for mount option ' ?' [ 406.319201] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 406.347341] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 03:59:51 executing program 0: r0 = socket(0x0, 0x2, 0x9) fcntl$setstatus(r0, 0x4, 0x2000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000480), 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x18, 0x18, 0xfffffffffffffffd, 0x0, 0x0, {0x1}, [@nested={0x4, 0x6}]}, 0xcb}}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x4401, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0x72, 0xab, 0x3ff, 0x7, 0x6}, 0x14) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r3, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) mbind(&(0x7f0000036000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000140)=0x10000, 0x10000001, 0x2000000000005) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={"6c6f00400000000000c0fe00", 0x101}) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000180)=""/191, 0xbf}, {&(0x7f0000000100)=""/62, 0x3e}, {&(0x7f0000000240)=""/67, 0x43}, {&(0x7f00000002c0)=""/47, 0x2f}, {&(0x7f0000000300)=""/25, 0x19}], 0x5) 03:59:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80243, 0x0) [ 406.382239] Error parsing options; rc = [-22] [ 406.389396] Error parsing options; rc = [-22] 03:59:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x11000000, 0x20000102000007) 03:59:51 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='\ncryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="8cc133ce4bf947d177e098d6a21ce844c4f5c85294383fafdfbac6e56b79fadb26e3f4aeab1dde581d1fa99ead91ce388b152ee244b383df37744707d35fbeed03e9583cb7449b0a40c807d375d582815b2449d940b4fea7b21c0a08e3480299b66a9349f8f517a3081975af03ede96355f58b794fc99e306feb0a2dba67b1aac57349bce5a105fb92da6a2f94aadfa73e0d1d737014c4a060ea60892535ab438d72ff8041892eb4c5ed15a8f01083853dcba1288c18a493ae9da40ad52fe5e1a80977f758c42d382ccab1731f7ba5c8ffad6bdda4dc30e9"], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 406.533806] netlink: 'syz-executor0': attribute type 6 has an invalid length. 03:59:51 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000040)=""/181, 0xb5}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000100)=""/9, 0x9}, {&(0x7f0000001200)=""/253, 0xfd}, {&(0x7f0000001300)=""/182, 0xb6}, {&(0x7f00000013c0)=""/164, 0xa4}, {&(0x7f0000001480)=""/238, 0xee}, {&(0x7f0000000140)=""/29, 0x1d}], 0x8, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) close(r2) [ 406.625393] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 406.714387] Error parsing options; rc = [-22] 03:59:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1600, 0x20000102000007) 03:59:51 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='%cryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:51 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x1, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) recvmmsg(r2, &(0x7f0000007000)=[{{&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000880)=[{&(0x7f0000000200)=""/141, 0x8d}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f00000003c0)=""/228, 0xe4}, {&(0x7f00000004c0)=""/184, 0xb8}, {&(0x7f0000000580)=""/66, 0x42}, {&(0x7f0000000600)=""/184, 0xb8}, {&(0x7f00000006c0)=""/122, 0x7a}, {&(0x7f0000000740)=""/233, 0xe9}, {&(0x7f0000000840)}], 0x9, &(0x7f0000000940)=""/44, 0x2c, 0x7abc55ef}, 0x8}, {{&(0x7f0000000980)=@un=@abs, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000a00)=""/41, 0x29}, {&(0x7f0000000a40)=""/26, 0x1a}, {&(0x7f0000000a80)=""/61, 0x3d}], 0x3, &(0x7f0000000b00)=""/4096, 0x1000, 0x1000}, 0x50}, {{&(0x7f0000001b00)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001b80)=""/243, 0xf3}, {&(0x7f0000001c80)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/193, 0xc1}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/219, 0xdb}], 0x5, 0x0, 0x0, 0x6}, 0x5}, {{0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/93, 0x5d}, {&(0x7f0000003fc0)=""/98, 0x62}, {&(0x7f0000004040)=""/121, 0x79}, {&(0x7f00000040c0)=""/72, 0x48}], 0x5, &(0x7f00000041c0)=""/203, 0xcb, 0x7}, 0x6b}, {{&(0x7f00000042c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000004480)=[{&(0x7f0000004340)=""/192, 0xc0}, {&(0x7f0000004400)=""/122, 0x7a}], 0x2, &(0x7f00000044c0)=""/93, 0x5d, 0x4}, 0xfffffffffffffff9}, {{&(0x7f0000004540)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000005a40)=[{&(0x7f00000045c0)=""/229, 0xe5}, {&(0x7f00000046c0)=""/102, 0x66}, {&(0x7f0000004740)=""/5, 0x5}, {&(0x7f0000004780)=""/172, 0xac}, {&(0x7f0000004840)=""/42, 0x2a}, {&(0x7f0000004880)=""/201, 0xc9}, {&(0x7f0000004980)=""/4096, 0x1000}, {&(0x7f0000005980)=""/180, 0xb4}], 0x8, 0x0, 0x0, 0x4}, 0x5}, {{&(0x7f0000005ac0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000006e80)=[{&(0x7f0000005b40)=""/158, 0x9e}, {&(0x7f0000005c00)=""/54, 0x36}, {&(0x7f0000005c40)=""/149, 0x95}, {&(0x7f0000005d00)=""/74, 0x4a}, {&(0x7f0000005d80)=""/4096, 0x1000}, {&(0x7f0000006d80)=""/225, 0xe1}], 0x6, &(0x7f0000006f00)=""/195, 0xc3, 0xa5}, 0x2}], 0x7, 0x2040, &(0x7f00000071c0)={0x0, 0x989680}) setsockopt$inet_buf(r1, 0x0, 0x4, &(0x7f0000000040)="68a96688ca88d611cde86c97a95cf0edca36da9b60c8e91eadf8a7b1c4d2936e782fdcf6be62f98b76e204dae96d84484d92f263328d312a3c7bb718ba59abf4", 0x40) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 406.980570] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 407.025053] Error parsing options; rc = [-22] 03:59:52 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="8b6372797074667300", 0x0, &(0x7f000001c000)) 03:59:52 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='e%ryptfs\x00', 0x0, &(0x7f000001c000)) [ 407.725562] device lo entered promiscuous mode [ 407.752883] netlink: 'syz-executor0': attribute type 6 has an invalid length. [ 407.872218] device lo left promiscuous mode [ 408.176268] device lo entered promiscuous mode 03:59:53 executing program 0: setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$gfs2(&(0x7f00000002c0)='gfs2\x00', &(0x7f0000000300)='./file0//ile0\x00', 0x0, 0x0, &(0x7f0000000540), 0x18c5c, &(0x7f0000000580)={[{@locktable={'locktable', 0x3d, 'bdev'}}, {@lockproto_nolock='lockproto=lock_nolock'}]}) 03:59:53 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="658b72797074667300", 0x0, &(0x7f000001c000)) 03:59:53 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x6, 0x40000) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) write$FUSE_OPEN(r0, &(0x7f0000000180)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x402) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x20000100400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:53 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000009, 0x24010, r0, 0x32) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x315441) 03:59:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x6, 0x20000102000007) [ 408.289845] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.307964] Error parsing options; rc = [-22] 03:59:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 03:59:53 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='e\nryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:53 executing program 3 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:53 executing program 0: getpid() r0 = socket$inet6(0xa, 0x6, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x7, &(0x7f0000000100)=0x6) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x78, &(0x7f0000000240), 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000001040)="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", 0x200}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0e0fa85f5d4bc19bc1ac1a6bcdffa41a139a434b43d349531ef8a4321b733d1ab179bd4efd548966e65ca677c15e2f0f2fff69368f2b3be1ea49eca093e99c1526e68e23b91820a9ca0db185d799a1c0b8ab197a1c66dbcf0fa24fb252fce904ab"]) 03:59:53 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = dup(r2) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r4) [ 408.581361] FAULT_INJECTION: forcing a failure. [ 408.581361] name failslab, interval 1, probability 0, space 0, times 0 [ 408.619787] CPU: 1 PID: 16856 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 408.628340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.637714] Call Trace: [ 408.640326] dump_stack+0x244/0x39d [ 408.643985] ? dump_stack_print_info.cold.1+0x20/0x20 [ 408.649195] ? debug_smp_processor_id+0x1c/0x20 [ 408.653879] ? perf_trace_lock+0x14d/0x7a0 [ 408.658133] should_fail.cold.4+0xa/0x17 [ 408.662212] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 408.667337] ? __f_unlock_pos+0x19/0x20 [ 408.667357] ? lock_downgrade+0x900/0x900 [ 408.667378] ? proc_fail_nth_write+0x9e/0x210 [ 408.667401] ? find_held_lock+0x36/0x1c0 [ 408.684089] ? perf_trace_sched_process_exec+0x860/0x860 [ 408.689596] __should_failslab+0x124/0x180 [ 408.693855] should_failslab+0x9/0x14 [ 408.697680] __kmalloc_track_caller+0x2d1/0x760 [ 408.702394] ? strncpy_from_user+0x5a0/0x5a0 [ 408.706823] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 408.712383] ? strndup_user+0x77/0xd0 [ 408.716212] memdup_user+0x2c/0xa0 [ 408.719782] strndup_user+0x77/0xd0 [ 408.723433] ksys_mount+0x3c/0x140 [ 408.727078] __x64_sys_mount+0xbe/0x150 [ 408.731070] do_syscall_64+0x1b9/0x820 [ 408.734978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 408.740354] ? syscall_return_slowpath+0x5e0/0x5e0 [ 408.745307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.750186] ? trace_hardirqs_on_caller+0x310/0x310 [ 408.755223] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 408.760253] ? prepare_exit_to_usermode+0x291/0x3b0 [ 408.765310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.770175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.775385] RIP: 0033:0x457569 [ 408.778602] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.797511] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 408.805234] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 408.812508] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 408.820269] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 03:59:53 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ec\nyptfs\x00', 0x0, &(0x7f000001c000)) 03:59:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x200800, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f00000002c0)={0x1, 0x40, 0xffffffffffff8001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x0) accept4(r2, &(0x7f0000000300)=@ll, &(0x7f00000000c0)=0x80, 0x80000) ioctl$TCXONC(r5, 0x5411, 0x70d000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'veth1\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="3b0000000600000009000000000000000400000000000000080000000500000001040000ff7f0000550700000900000043f9ffff04000000"]}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) setfsuid(r7) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 408.827568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 408.834866] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:53 executing program 3 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:53 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ec%yptfs\x00', 0x0, &(0x7f000001c000)) 03:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x18080000000000, 0x20000102000007) 03:59:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:54 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) close(r2) 03:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf4ffffff, 0x20000102000007) 03:59:54 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="65638b797074667300", 0x0, &(0x7f000001c000)) 03:59:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x4, 0x62401) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x8000, 0x4, 0x5, 0x4, 0x0, 0x7, 0x80000, 0x4, 0xad, 0x3f, 0x0, 0x7, 0x6, 0x8, 0xc2, 0x5, 0x1, 0xd8, 0x4, 0x9, 0x1f, 0x7, 0xfff, 0x2, 0x46b6, 0x7, 0xb, 0x0, 0x7, 0x3, 0x3, 0x8, 0x3, 0x9, 0x4, 0x777b, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x8041, 0x7, 0x5, 0x7, 0x1, 0x33, 0x401}, r1, 0x2, r2, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x102012, r1, 0x0) 03:59:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)="982376dbf1f213a594424424053d7269f1c371ce18838d1f5007214b6f293618b1b087900a0d1977", 0x28}, {&(0x7f00000000c0)="a72be6eeb18b942a9a822542302bab745f64e2ca8575d98ed18f6f1bcdd3010bf0ff62b7e60f192f1a44331da7a2a0086a9ab838477ed2067ae948d0937127581cfb6ccb66a429d859a616b5df035d2e8b699759b959d6c7ac7d776a69c0a0a3b78c438c004733107a21609ed61be65878ba4b267887dde16a23d2d041f29e43f260df70e6ca6b17e2930861a00c94c0c9301d82", 0x94}, {&(0x7f0000000180)="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", 0xff}, {&(0x7f0000000280)="606353f61391b1ada63fbde293ec95c25af7c984ee878caaf3bb4459ec937d3255b77c75b73a5329428c7352d65e2f2b6adf5802f075e0f132f4e77312ac3cd81516e81705d54798a2bdf579b06729644352a7f51d6eea778ffeda24ef5a29a49e0b664d3783ff84ff13637ca176a21fb568e3ba83d1a0da8e9a7a3295d37f089c350ed5a65f5c84a5e29f4590e4746618377407d010879759bd33dd3cf7f4d268730e5ba50ec6b4a005c3900f4dacd9bc9b3dfbd51017a488f8e5dcc1199866d6ecb69d59b63b", 0xc7}, {&(0x7f0000000380)="d77416a5315e6a625f80658ec999732c552e5e0a014c8a48c3986ab00e3149288071ea992fcff4c57bd3e94eab73cd8a8262bd42493092da6521843d835d3f5738c6c735b6dedd16435753411c1b44fff816b85b991339c5608925923e18ee7fbb8b8dfd0e9f92f38d985c10b30d746904fa2fb8c852fe3b204ba0336841d1a3dbb1df2a", 0x84}, {&(0x7f0000000440)="76b7f5acc69e77b6243400799d9a9c062873c565428ec8cffab3e665ed67812bdfa38506c276bc628302f2dd1532d0c17f2c2570586ddb66446e9b96e225e4cb7586821bbe5fb436713ff2a9442398230ec39a24c805213355cc03b64ad65345a76a4fc9538c86e63bb5e4abc2445c051b5ac02daef907873f0cd19d268aa05650876a810c09f369e98c79e4af526c90827c05afa53425a4b745d6473f8061b551ab8d3a1912a28be7755d4fabd13ded9f946a9f1dad6c40f89a146a1a0b1c6e60a187b57f40198328d9b45da37ad70d32d05dc189d37eecfe8475467676c509", 0xe0}], 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:54 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecr%ptfs\x00', 0x0, &(0x7f000001c000)) 03:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xffffffa1, 0x20000102000007) [ 409.466297] FAULT_INJECTION: forcing a failure. [ 409.466297] name failslab, interval 1, probability 0, space 0, times 0 [ 409.502017] CPU: 0 PID: 16912 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 409.510554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.519921] Call Trace: [ 409.522532] dump_stack+0x244/0x39d [ 409.526190] ? dump_stack_print_info.cold.1+0x20/0x20 [ 409.531433] ? debug_smp_processor_id+0x1c/0x20 [ 409.536128] ? perf_trace_lock+0x14d/0x7a0 [ 409.540391] should_fail.cold.4+0xa/0x17 [ 409.544488] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 409.549636] ? lock_is_held_type+0x210/0x210 [ 409.554081] ? save_stack+0x43/0xd0 [ 409.557722] ? kasan_kmalloc+0xc7/0xe0 [ 409.561622] ? __kmalloc_track_caller+0x157/0x760 [ 409.566474] ? memdup_user+0x2c/0xa0 [ 409.570206] ? do_syscall_64+0x1b9/0x820 [ 409.574299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.579718] ? proc_fail_nth_write+0x9e/0x210 [ 409.584280] ? find_held_lock+0x36/0x1c0 [ 409.588451] ? packet_recvmsg+0x1e8/0x16d0 [ 409.592726] ? perf_trace_sched_process_exec+0x860/0x860 [ 409.598208] ? lock_release+0xa10/0xa10 [ 409.598224] ? perf_trace_sched_process_exec+0x860/0x860 [ 409.598253] __should_failslab+0x124/0x180 [ 409.598303] should_failslab+0x9/0x14 [ 409.607750] __kmalloc_track_caller+0x2d1/0x760 [ 409.607785] ? strncpy_from_user+0x5a0/0x5a0 [ 409.607811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.607827] ? strndup_user+0x77/0xd0 [ 409.607846] memdup_user+0x2c/0xa0 [ 409.607864] strndup_user+0x77/0xd0 [ 409.607882] ksys_mount+0x73/0x140 [ 409.607902] __x64_sys_mount+0xbe/0x150 [ 409.649040] do_syscall_64+0x1b9/0x820 [ 409.652960] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.658358] ? syscall_return_slowpath+0x5e0/0x5e0 [ 409.663316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.668196] ? trace_hardirqs_on_caller+0x310/0x310 [ 409.673238] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 409.678281] ? prepare_exit_to_usermode+0x291/0x3b0 [ 409.683325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.688200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.693420] RIP: 0033:0x457569 [ 409.696635] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.716041] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 409.723800] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 409.731107] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 409.738434] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 409.745717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 409.753018] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:54 executing program 3 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:54 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 03:59:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:54 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="6563728b7074667300", 0x0, &(0x7f000001c000)) 03:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1e00000000000000, 0x20000102000007) [ 409.932989] FAULT_INJECTION: forcing a failure. [ 409.932989] name failslab, interval 1, probability 0, space 0, times 0 [ 409.966285] CPU: 1 PID: 16949 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 03:59:54 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x408001) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000001c0)={r4, 0x80, 0x9c, "b01a811c9b504aa0d04db88048d3bb3afbb38d8c57625701712bebf05ad3a967eaca03e0080e4094200e79bb5ddfee745fabf4a2d3c9d78c9a4ab8575b4de1f9c4e8d5de92cd8988a20271a1a41c2f26d665252ecade91aed6082f1c5d59166aa405894c15363d8de2d89582cd3c11e9d5c4ad509c01cdb2a84f7784aafc858ed92b9b697ab6c1356426d55b2e0281e20925fefa3ef0a62a9e5b9cef"}, 0xa4) tee(r2, r1, 0x1, 0x0) 03:59:54 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecr\nptfs\x00', 0x0, &(0x7f000001c000)) 03:59:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000301ffffef7f12b685e4901b0000000030f8b376b46732d2f96ba090635c2cb77b6e18d21102001f11a2c0e754f417b148c35f46cf9497ce1c62fb68bd1c35dcfda48078a7a87408fe6a70409e1ecfa2737e7e979d42b8a8faa7830a28fd55cf4594422401045305d5d6c9a69b1cf934ac480d5405bf4af30900000077b19f8ed12e443758e36906f1"], 0x8d}}, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000500)="b2b1227f12233dccb2", 0x9}], 0x1) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x180}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x210, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40000) recvmmsg(r0, &(0x7f00000091c0)=[{{&(0x7f0000008a00)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000008c40), 0x0, 0x0, 0x0, 0x8}, 0x3}], 0x9, 0x0, &(0x7f0000009240)={0x77359400}) [ 409.974823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.984188] Call Trace: [ 409.986811] dump_stack+0x244/0x39d [ 409.990471] ? dump_stack_print_info.cold.1+0x20/0x20 [ 409.995699] ? debug_smp_processor_id+0x1c/0x20 [ 410.000383] ? perf_trace_lock+0x14d/0x7a0 [ 410.004646] should_fail.cold.4+0xa/0x17 [ 410.008735] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 410.013882] ? lock_is_held_type+0x210/0x210 [ 410.013908] ? kasan_kmalloc+0xc7/0xe0 [ 410.013926] ? __kmalloc_track_caller+0x157/0x760 [ 410.013940] ? memdup_user+0x2c/0xa0 [ 410.013959] ? zap_class+0x640/0x640 [ 410.022273] ? do_syscall_64+0x1b9/0x820 [ 410.022341] ? find_held_lock+0x36/0x1c0 [ 410.022407] ? perf_trace_sched_process_exec+0x860/0x860 [ 410.030941] ? lock_release+0xa10/0xa10 [ 410.030957] ? perf_trace_sched_process_exec+0x860/0x860 [ 410.030977] ? usercopy_warn+0x110/0x110 [ 410.031001] __should_failslab+0x124/0x180 [ 410.031020] should_failslab+0x9/0x14 [ 410.038800] kmem_cache_alloc_trace+0x2d7/0x750 [ 410.038822] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.038840] ? _copy_from_user+0xdf/0x150 [ 410.038862] copy_mount_options+0x5f/0x430 [ 410.038882] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.093989] ksys_mount+0xd0/0x140 [ 410.097544] __x64_sys_mount+0xbe/0x150 [ 410.101539] do_syscall_64+0x1b9/0x820 [ 410.105443] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 410.110835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 410.115785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.120644] ? trace_hardirqs_on_caller+0x310/0x310 [ 410.125672] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 410.130720] ? prepare_exit_to_usermode+0x291/0x3b0 [ 410.135798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.140663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.145865] RIP: 0033:0x457569 [ 410.149049] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.168025] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 410.175723] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 03:59:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1a000000, 0x20000102000007) [ 410.182981] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 410.190252] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 410.197511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 410.204781] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:55 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x10003) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setns(r2, 0x2000000) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) close(r3) renameat(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00') 03:59:55 executing program 3 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:55 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372798b74667300", 0x0, &(0x7f000001c000)) 03:59:55 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100000001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fremovexattr(r1, &(0x7f00000000c0)=@random={'btrfs.', '/dev/snapshot\x00'}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000100)=""/5, 0x5}], 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) 03:59:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x300, 0x20000102000007) [ 410.416740] FAULT_INJECTION: forcing a failure. [ 410.416740] name failslab, interval 1, probability 0, space 0, times 0 [ 410.454813] CPU: 1 PID: 16968 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 410.463364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.472724] Call Trace: [ 410.472752] dump_stack+0x244/0x39d [ 410.472792] ? dump_stack_print_info.cold.1+0x20/0x20 [ 410.472823] ? debug_smp_processor_id+0x1c/0x20 [ 410.488917] ? perf_trace_lock+0x14d/0x7a0 [ 410.488943] should_fail.cold.4+0xa/0x17 [ 410.488970] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 410.502418] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 410.507368] ? kasan_check_read+0x11/0x20 [ 410.511538] ? rcu_softirq_qs+0x20/0x20 [ 410.515546] ? rcu_softirq_qs+0x20/0x20 [ 410.519539] ? unwind_dump+0x190/0x190 [ 410.523458] ? find_held_lock+0x36/0x1c0 [ 410.527623] ? l2cap_build_conf_req+0xcf8/0x1f30 [ 410.532415] ? perf_trace_sched_process_exec+0x860/0x860 [ 410.537894] ? save_stack+0xa9/0xd0 [ 410.541544] ? kmem_cache_alloc_trace+0x152/0x750 [ 410.546413] ? copy_mount_options+0x5f/0x430 [ 410.550844] __should_failslab+0x124/0x180 [ 410.555093] should_failslab+0x9/0x14 [ 410.558908] kmem_cache_alloc+0x2be/0x730 [ 410.563061] ? find_held_lock+0x36/0x1c0 [ 410.567136] getname_flags+0xd0/0x590 [ 410.570960] user_path_at_empty+0x2d/0x50 [ 410.575147] do_mount+0x180/0x1d90 [ 410.578709] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 410.584259] ? rcu_pm_notify+0xc0/0xc0 [ 410.584279] ? copy_mount_string+0x40/0x40 [ 410.584309] ? copy_mount_options+0x5f/0x430 [ 410.584333] ? rcu_read_lock_sched_held+0x14f/0x180 [ 410.601884] ? kmem_cache_alloc_trace+0x353/0x750 [ 410.601908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.601927] ? _copy_from_user+0xdf/0x150 [ 410.601949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.601969] ? copy_mount_options+0x315/0x430 [ 410.626607] ksys_mount+0x12d/0x140 [ 410.630256] __x64_sys_mount+0xbe/0x150 [ 410.634313] do_syscall_64+0x1b9/0x820 [ 410.638220] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 410.643614] ? syscall_return_slowpath+0x5e0/0x5e0 [ 410.648577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.653443] ? trace_hardirqs_on_caller+0x310/0x310 [ 410.658486] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 410.663527] ? prepare_exit_to_usermode+0x291/0x3b0 [ 410.668570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.673444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.678653] RIP: 0033:0x457569 [ 410.681863] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.700805] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 410.708527] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 410.715811] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 410.723103] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 410.730385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 410.737670] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:55 executing program 3 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:55 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecry\ntfs\x00', 0x0, &(0x7f000001c000)) 03:59:55 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecry%tfs\x00', 0x0, &(0x7f000001c000)) 03:59:55 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r1}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) [ 410.955624] FAULT_INJECTION: forcing a failure. [ 410.955624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 410.967529] CPU: 0 PID: 17000 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 410.967541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.967547] Call Trace: [ 410.967573] dump_stack+0x244/0x39d [ 410.967614] ? dump_stack_print_info.cold.1+0x20/0x20 [ 410.967639] ? mark_held_locks+0x130/0x130 [ 411.001138] should_fail.cold.4+0xa/0x17 [ 411.005222] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 411.010366] ? mark_held_locks+0x130/0x130 [ 411.014644] ? mark_held_locks+0x130/0x130 [ 411.018894] ? zap_class+0x640/0x640 [ 411.018912] ? lock_is_held_type+0x210/0x210 [ 411.018930] ? print_usage_bug+0xc0/0xc0 [ 411.018959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.018983] ? check_preemption_disabled+0x48/0x280 [ 411.041723] ? debug_smp_processor_id+0x1c/0x20 [ 411.046412] ? perf_trace_lock+0x14d/0x7a0 [ 411.050668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.056237] ? should_fail+0x22d/0xd01 [ 411.060152] ? lock_is_held_type+0x210/0x210 [ 411.064585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 411.069820] __alloc_pages_nodemask+0x34b/0xdd0 [ 411.074507] ? rcu_softirq_qs+0x20/0x20 [ 411.078505] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 411.083549] ? find_held_lock+0x36/0x1c0 [ 411.087634] ? ip_vs_in_icmp_v6.isra.24+0x5a8/0x1120 [ 411.092787] ? trace_hardirqs_off+0xb8/0x310 [ 411.097226] cache_grow_begin+0xa5/0x8c0 [ 411.101295] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.106843] ? check_preemption_disabled+0x48/0x280 [ 411.111873] kmem_cache_alloc+0x66b/0x730 [ 411.116028] ? find_held_lock+0x36/0x1c0 [ 411.120103] getname_flags+0xd0/0x590 [ 411.123913] user_path_at_empty+0x2d/0x50 [ 411.128069] do_mount+0x180/0x1d90 [ 411.131619] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 411.137162] ? rcu_pm_notify+0xc0/0xc0 [ 411.141054] ? copy_mount_string+0x40/0x40 [ 411.145299] ? copy_mount_options+0x5f/0x430 [ 411.149715] ? rcu_read_lock_sched_held+0x14f/0x180 [ 411.154738] ? kmem_cache_alloc_trace+0x353/0x750 [ 411.159600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.165148] ? _copy_from_user+0xdf/0x150 [ 411.169305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.174846] ? copy_mount_options+0x315/0x430 [ 411.179351] ksys_mount+0x12d/0x140 [ 411.183001] __x64_sys_mount+0xbe/0x150 [ 411.186989] do_syscall_64+0x1b9/0x820 [ 411.190885] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 411.196254] ? syscall_return_slowpath+0x5e0/0x5e0 [ 411.201190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.206043] ? trace_hardirqs_on_caller+0x310/0x310 [ 411.211065] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 411.216092] ? prepare_exit_to_usermode+0x291/0x3b0 [ 411.221120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.225978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.231170] RIP: 0033:0x457569 [ 411.234367] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:59:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1700, 0x20000102000007) 03:59:56 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryp%fs\x00', 0x0, &(0x7f000001c000)) 03:59:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000008000a0000000076ce40709400040012000000010000000000000066ae8395307c39217071b812000200000000"], 0x1}}, 0x0) [ 411.253274] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 411.260988] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 411.268262] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 411.275533] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 411.282812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 411.290083] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 [ 411.315196] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.329144] Error parsing options; rc = [-22] 03:59:56 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r1, 0x5, &(0x7f0000000080)={0x2, 0x4, 0x45, 0x1000, r3}) close(r2) 03:59:56 executing program 3 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x80041) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="855900005870e3aedb4bcda38f56903f1377a42988b4ee5e332347ee598aa9"], &(0x7f0000000100)=0x23) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x8, 0x1, 0x0, 0xf3b, r2}, 0x10) 03:59:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x10, 0x20000102000007) 03:59:56 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="65637279708b667300", 0x0, &(0x7f000001c000)) 03:59:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1, 0x800) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/56}, 0x40, 0x1, 0x1000) [ 411.581699] FAULT_INJECTION: forcing a failure. [ 411.581699] name failslab, interval 1, probability 0, space 0, times 0 03:59:56 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x3, @perf_config_ext, 0x50}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) read(r0, &(0x7f0000000100)=""/65, 0x41) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x9], 0x1, 0x40, 0x8bb, 0x180, 0x0, 0xfffffffffffffff9, {0x0, 0x9, 0x21, 0x81, 0x5, 0x2, 0x10000, 0x5, 0x4, 0x4aa, 0x80000001, 0x1000, 0x3, 0x8, "a8aa47dd007d11ba95e0d2d42e0b5c0e34a6ac3cfc8e30c05d1a8d11ab2b6f1a"}}) close(r2) [ 411.668155] CPU: 0 PID: 17030 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 411.676703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.686072] Call Trace: [ 411.688687] dump_stack+0x244/0x39d [ 411.692345] ? dump_stack_print_info.cold.1+0x20/0x20 [ 411.697560] ? debug_smp_processor_id+0x1c/0x20 [ 411.697582] ? perf_trace_lock+0x14d/0x7a0 [ 411.697608] should_fail.cold.4+0xa/0x17 [ 411.711064] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 411.716190] ? save_stack+0xa9/0xd0 [ 411.719836] ? save_stack+0x43/0xd0 [ 411.723488] ? kmem_cache_alloc_trace+0x152/0x750 [ 411.728371] ? vfs_new_fs_context+0x5e/0x77c [ 411.732804] ? ksys_mount+0x12d/0x140 [ 411.736656] ? __x64_sys_mount+0xbe/0x150 [ 411.740843] ? do_syscall_64+0x1b9/0x820 [ 411.744935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.750321] ? find_held_lock+0x36/0x1c0 [ 411.754433] ? perf_trace_sched_process_exec+0x860/0x860 [ 411.759903] ? debug_mutex_init+0x2d/0x60 [ 411.764084] __should_failslab+0x124/0x180 [ 411.768332] should_failslab+0x9/0x14 [ 411.772150] kmem_cache_alloc_trace+0x2d7/0x750 [ 411.776841] ? rcu_read_lock_sched_held+0x14f/0x180 [ 411.781874] ? kmem_cache_alloc_trace+0x353/0x750 [ 411.786744] legacy_init_fs_context+0x187/0x230 [ 411.791441] ? vfs_dup_fs_context+0x400/0x400 [ 411.795945] vfs_new_fs_context+0x3f4/0x77c [ 411.795969] do_mount+0x613/0x1d90 [ 411.795990] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 411.796011] ? copy_mount_string+0x40/0x40 [ 411.809417] ? copy_mount_options+0x5f/0x430 [ 411.809439] ? kmem_cache_alloc_trace+0x353/0x750 [ 411.809461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.828471] ? _copy_from_user+0xdf/0x150 [ 411.832633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.838177] ? copy_mount_options+0x315/0x430 [ 411.842685] ksys_mount+0x12d/0x140 [ 411.846327] __x64_sys_mount+0xbe/0x150 [ 411.850318] do_syscall_64+0x1b9/0x820 [ 411.854223] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 411.859599] ? syscall_return_slowpath+0x5e0/0x5e0 [ 411.864540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.869409] ? trace_hardirqs_on_caller+0x310/0x310 [ 411.874457] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 411.879481] ? prepare_exit_to_usermode+0x291/0x3b0 [ 411.884527] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.889396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.894588] RIP: 0033:0x457569 [ 411.897803] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:59:56 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x6, 0x424, 0x1, 0x5, 0x0, 0x4, 0x1000, 0x2, 0x0, 0x1, 0x2, 0x20, 0xe3, 0x8, 0x7, 0x0, 0xfffffffffffffffd, 0xffff, 0x0, 0x9, 0xfffffffffffffffa, 0x9, 0x4568, 0x0, 0x2000000000000000, 0x3, 0xb5, 0x10000, 0x8, 0x3, 0x1f, 0x7, 0x80000001, 0x0, 0x5, 0xe43, 0x0, 0x9, 0x2, @perf_config_ext={0xffffffff, 0x3}, 0xde336e3f9ed5ba9f, 0x1, 0x7fff, 0x7, 0x20, 0xfffffffffffffffd, 0x6}, 0xffffffffffffff9c, 0xd, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x84000) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x160, 0x26, 0x400, 0x70bd2a, 0x25dfdbff, {0xb}, [@typed={0x8, 0x1c, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}, @nested={0x144, 0x74, [@typed={0xbc, 0x1d, @binary="b33014f0ed8d2411df0ebae60e11be9c8f82087a728a0fae2128980dbd8e1c4f849e42f1c78f52d5a76bd04f5adf8ad3107e7f420bee8fa09488a3f7d80fb56964ec1b99c2c210f7467c3361015ac864bcb1241be0ec08a802ee02a0231c5eac289ee5253d1d3bbf7fdbb5b057623c357e5152aa1f6f934a1bba783a94e56b4093643e4b733c13ff8bd66bf13380472fc6b6c6c03c3c231c8fcc610e80c6497e3f91ca71e9ef956692ab7bd7259aac84f25f17d0131ca9b3"}, @typed={0x8, 0x75, @fd=r0}, @generic="df408940897abf5077ae215c346a5f97451a2966f7c91becb69248ab4d7cc5063408c6ca86a4cbc97350975a52c419138cb3059f40358de518e9e3873424bebf57cda5c271ed145402337a11c8da6180fd74b51fb461ca3f44548e8c786d335a97b79dde361de71e412ba1a0680d67f1dd3b3b72ac6ea725a6296a"]}]}, 0x160}, 0x1, 0x0, 0x0, 0x840}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x400, 0x0) [ 411.916725] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 411.924462] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 411.931747] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 411.939062] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 411.946344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 411.953622] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:56 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000380)=""/179}, 0x18) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x3cceb664, 0x0) 03:59:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000001540)=[{&(0x7f00000000c0)="331e3ab6fb713f7c5aed871fbfe200dc822698134f24d5983295c7ad37cadfd2465e8a5b1c295dcb1fb9cf5002d0cbd56a8f59a4c0643ef0b0f75322d669c8b49ba8f20b50df5c6d536908f0acb509fda12f8bffa136b82ad77f33111526b64312836a482d6b4d33450c9963d7a3c5b9a544c4fd8a23d2e88e146a07604566691c3f", 0x82}, {&(0x7f0000000180)="6db102921ad3b831a508008f42aeee1f4cd6b3f6122cfc34bb0ae1d507b4504413315895e0872fb968bd660e187011306eb76f508fa8187b4a81e909491f23b5e67d9690c21d18f30ef41ec248b8510da291ed54b91105fb2214997af1240131bab6d0dbe6e6dd26b82989c42d939802948cc654e6be74fa5d21754358a706b3b85a0a81f153de6ea7da760ad71612", 0x8f}, {&(0x7f0000000240)="a46875864ae2d0da4658b5879a6d1888914a56b1a7993f73e1c049feae787bd6856904df0d6e3e904bb12040b007fc9abc4202a273926ab3e46f14e387f0bc20efd291b57c2cc0b495d30c21bf80e8667ee09e40704d394345107392eb0f76e98cc5107d82526d095765201bea9736a8c548a5e47d240af83258ab470ec7a810a38c255b4e97722e48890901fe66cd6e32e86172c3424ee570d89e22a106d65bdca611a68e63c22e88edb2e33a85800511c114a8bba52f50202a3fd7043c9fc905cab580dd70c0b4b78fb05c0c54401da3b52f1a910270d8334ddc", 0xdb}, {&(0x7f0000000340)="8648424849194174de5607bfe214b2da2e352d2f614daf5236999421b100ccaddd225080b639bcb993d0c7362c6308ec00d480c581e3844d9c3b10844bd583b4ae7065fdb5", 0x45}, {&(0x7f0000000040)="01db07679bbc77ebb93179531670e95a3c1618a35df46e3800fe0ccd1583baac75ece7", 0x23}, {&(0x7f00000003c0)="dff930387adc5ab1755e2c9d37bc6c1f70e356809813a74c773a2c0b89a49bcfaf156c410846956080531e4274e7bfc5dc4fd52758bc9bc8bae6ecbe94db4ab797ee2416630c95150804a16fcf781509a2341ef746b21b7287eaf891f7f443e74f0c530aa1e83f747d31297cd3ccb1b06e5e586894262c1c09010b986d6001676671eea15c1f9d6db28278c143f93e9e7b592af413b5e12b4f4d0d52ad3a022cff7776dfde23d078d3a93244652030f34521919d86bcd77ac9fad320a3de41d5b5b32b73b2129ece2dcb", 0xca}, {&(0x7f00000004c0)="0fee7e71ab7eed2839d786dfa76136b602a84d073d6a7e4c4be49219124c8b9f35fb34bf0b7780865f118a6a477bb15a714b64a826930b80fd21f3f26186ebf7bf19bc908fd4d5a1ef63a593453973f5ec43078d896be8cbefc54fe6b7ae0ecbd2a349472bebf1aa0d25a3cebee369f4942770ccd8ea92695a5e0f5b259ad12ea8bed2a8540e13e9f4c21142c8b93743dc9ad48a8b9b9dd8e5f28bbfc02d3ea16b872ef6c5f6e0cfb166c2c7ea3b80e1f4e89c47a5061db13a0aa94013f93ef018a70f2e0f82912e817bec0524b0c04a4dfb3c0449c75ddc7428a56e9d327e2b4b5da433d5d35386f0c95edc95d8ba3218046a79c527a35e9b64931ff84bf44ae2b54512557d303e68927b3eee7f6642436bfbd2b2c821a2575469894f7f948492be0c928d86adc795652507f769534a814aae0eed41a4afe8adc1dca1e00fd30c7117128549e38c3637ddad85324e22232221a89064549b22d3e8f22f814af741c1c6bb3cf9d1e580e11f73e892b675678f1a34015d6445c07d0ffd0ad5fc0c518995a8cdd7f6607fde19bcd01181d4d8739dcbd98c88f043a637706e65f0f3b0fc0bb8e10c33b1803169c6ecccb7e23d3b36436207ff266511e616e52caf67a0b9c4eb1dcc5eda4d03c5902dd28d1a3bd03ffe5225e59ec39683f1a694803960579e7123410e0ff8e6af90662e2a726e32acb187df743cc56447900512ac87e3c872c8d12ebbc98bb86e942b91b8544b4a1cb600f6d950dbd544fdb6afc36080e1e754fda6dbd78483a3b696a22dcf87bfbd83096d64d0980d39cf393cce747a758fcfa08ac760866376bbb0c184ed14e227cb3df9fcf52a0464a85c38c55d10a194cc267e8d8e72a8b28f5366374ca08ec80426bb461dca13fb32bf7332eb719c4e25ac81e4c4564be85679bc2f6d57b532bb3cd857f38172d07a43bc0840ed94042d9fae2d7854e9397ca9e25bdc36b7899424c9d72276d0182075fa988a858682622e54b10c4b09e0a4fa4f20448e10859dd5b036b9385c5eea2aff0136d80d78930c660eda61d5d84caaded75cd335e1290cc01af30284a670bea4d095f99c2872a767af25a2882c31cb85f3a070801017ceeedff6d434f9828e6a81d1fc5b792b3891255bcbc8db69ae77fa105bbce6311c5a8350ff2af140e915cd782c2bf293565cf3559af7eacea8f46ee678e5ee54f644e963c519826f07a50c67a259f47c486e376488a6435328c27a09c90c7446944821e4e2dc31010fe8eaca0aac21568bd382db83f01af29b13beb4361fab3b675030cc7118288a3789903bdf6fc8b8051f648d2a5f1f56ad91de2c630e3c9592f4494f4b3cdb69fef3da9d9efd72c58ef5ae5704954300b32b7000199fbb84bf9399728a5b07eb79f65c72cd23b95274cb10b59751182ffcacd3d9aa76d8512095575280984547b29ad18758deedc23540719b256c4b933d75870dd130e08b79a68e1537889f125e7bed945a356b2ee42dc82cf999c527541b84bda23b59cb501e30e8f14fb982fd2fb15b68f92d09722a6a7b37afba586f13873babd9dc7a73ca98b9b9e187efe0547c52afeaadc082b20d741b34aeae00c0fa58b1be10f47322bf133acda4fa03eb22faeab06171ed7020a6688593c8a43cb8718ac82f2ac3f0a41be9bcbf542e6a873829c5ef4cc62fb1b72fe8d4d84cbb77a41d073a06b101158f928f077c8e72eeefcef7db63131f82bcf8fdcc2fcf35407a2c67029981d413796affc70374e517e19c68c56705a357f0bd73b180a8a864b428ffdff52bccbf922767cc5beb05ecc06daea478ff4e0dab3bba15ef2a0e77083fe272118b0c63e76c3d8cc08ed5ff0d9454930edf2bb3da1f182c99617fbf7ca5dfd240de1ae701885884f02655525dca1acf66325ff991beca9c6460d58b8491492239c98d1d6c00de2078fd40a981d8d34b84e123f03a41e6135375d4f5ecd2bf027cae62a8e1a915b63c188291f6b42aea4986997d8adc15365272fdfc7eb6d1e27dcb70c11fd05ac67cdd71b5e59d7d5c8687b6453f12d48b68489d50ff1e181ae590af9277d1b257db7e58221afe12838375e9669e35d6e2303e087bb7fb423e6fac340465982affdc17ba004a264ebd8d6d04b0976985f26316329a4d0148a32db73670c908e5fde90938e44324f0b8e515905ae9f147bd7aecca3150cfaa43376c499e59e8172313e204ac1606b1a800073a64687db03d40ecfed519ad4fd852a2789d3e352603a68fbef18ca05f32470cefd07e53a087819cf92ffcd4a36ceffb89b17a2a03124efe315de3637e0c587a3b2843d84b715dee844e7ab2b85fc52b703927c3e1f871ce62694f223dede6a9778ea17b6e3c0a589d3f33320df63b67b7816fd99697348123596478e4da54a836ecf8cf8bb2368f65ad60be79f7cf51206fff2199c36cbdc5efffeacbd89d989d24aeab8060579b79b1d4d90e06f7a534fda06bdad1e61b600266685cb32be0ccda6ceb2bf3a319cf2b8a125678817d121f9a5329d921cd9e6bc413f1946a5c69ee9fb1dcbe49a580dc024b5ef66ae62a1fed79f8c34cecdab9ff48aa0d5656ef059657b546f349227ed87d084b29d51bb3cf6745b3b22603e0728172b7def5f9685bb2e7a6ab4ff4721a8c7f545d14cb81f8e620fc738689b99caa781c6c3d0935ed343ff23c5d763a9cc5d6909864dd239480650c0033ee91e2ce45c73ef1df4b583fef7a5af08dde0f2ff57ecc01907916fa005f6260aafa0a4e0174289a6048403976faf7090da8eaae9b1ea4e2c6a3ecd6ef04af7639e786340afed9f3415ab1e534ed3840b3b1c1bfed4787ff407fcdc461bc79d92d7065fec3578d9022bed9b5a22d43e318dfb9384ada7f9ca1ebabc6b1a7d115ceb4c9076edd0037c251316ede9122be1d9e89dc2ed62419efe0c05209b73da2c89bdb14cee26b534dc955c45c2802546892b542861ab98b5b549ec156915dad496da5273b96b82d85b21c545aa8cae4c051e2ba25a06f1566c37040afd1b0e43438960a44656aee6eb5723fa49ae83db7d98947eeb089b5db621d045753d540098c404e6dd698d2c945a044bea6f8fe08073e32a69869b78f1d807e43960a19e21a7f6e623d8bbcd10fccb78181fb5c90a7ceaebaf16fb24cdb73434cc4f82967f10b69baf398df0a097c37484df233c4b39a3f93cf29492c691e92dea6bb9baa02d4ffadd3f1ff8ee2fa3c006c14161961a273f4febf441292986f4dd7ae673d7d579d129f82b58899ba3679e73737c22f7342fe3e2e20a7c173cb314b4ee7ad1d8854b5cc6fc23d9e8b40b36053b6539c74e91bc6889f50ed342f9542446357cffa11f5b2fa8565c740c9b4faaa2dd9d480fc9fbd14ca4c1f06452e7b75684f8465d34e8ffcd80306744dfff97630c03683f501ae4c950e5c2f6b03f087c3f7b7223355440678bb72b9d34b4a9cf8bfe20a499997abb38698ade5f870ccfbdf7b88b1ea858e631fead06824efe5fe8bfca7fec3c051563ec9f6edb4f50784162d5247ca272f79e83a0fb23688226f6303b6e1f9535875029f89e1434880e0c5a782e006d2c1089485a90d0c3996497ab932c97e7ad58278a5dcfb9b63ccbf1023afa4e71d98208d52cc0e6944e1bc0f272cf2bcb78148587470aa3a285e701e48637d41d732707b58a7a7b86a8b01996fdd759c3dccaf410b62edfc2c3a8026b99a3741a956aa5e2aa3d75cd8265d42100744eb744e9c71118ef271850f79e2a2dcefd9a0f4d71c7e8ee5d750399306d86193aa73a9ebb9c4587e053c9c3fcb9b4b52d86c02995e63208b940645f055acf9a94e0fcf62cd59331064a9f7e666640946e051c43166a3ed078dc2548d4dc136ad51599af426902b8039d4d31a362206eb642daec00cb1099a889d32bf5e9f7440f753dc0bdb063f66060cc92bfba45124b8912621bba3e348883c4789e804da2978708950261503eda417527964f92795060937a792455c5e7c97bf5d67dfd16a9657d0e5fb019618d3626e48ad1b90e7e554978b52d4acb9f72d5c2324b887f74d6a215fda99eb854d740635046d6e8a498e3c5a923c486359114354e1c92c8f3600ee693df799f0ae0b3f63db9aae1ae36e2ad6362c4707daa9bcd2a855e5db2e07c09c988f49bf302638e6b08f2d17601935e78a45040bdf58f2f0db40856618600c52869293b5ced9699cbf4fbeef5b4995352a0d23e70a0fd7d0bbe660a903f41c10506ce91b83032aa411b294853d4e329efa9bde2b79b0059450b918079ab0c2bc1c3b1c0d8b0f602a7780d3c985fecc987d95d98ab1a204890e05eeebbb6445acba6988dbb85438260470b5c4ae06d4a93af67d28dc8a15dd750bf8ea555860757188331053831cd58ab9269c91c5d0b81f0ab4cca1f5d1d14b64fd8a3a3eca992bdbb6f002770e21caa6988ec90e72b6e483a7f8bee4be81ef3737ec051f11b5ff6e37e3c626d05477916e13acce217cbb090503348fc84f8b078c6ad164b7824ba7d782303819db1a0cd326b260783cf54037022abb28d1568e04ca542cc976f2ec32013819d819a97677c7106f0b6a7d296af08ef436acacc794aa64aae50646b800946d1a89b97397d53a49f8cb388fdf51c06cbc96317c73463ff8e63aeb625219e36716efd1309b0bf0749c4920203dc7b113d000b6d6712921d8556099f1b1a63e33a9896bed174bcf3c8095ac50a770169e0de185e83b1e071d48fbfb3a6676b7fdb0a44c007cf65d1803186c267a23bbad85437b75fef91eef6ed1abbf5e71bad86b20cd769d89b61c605f863d0f233e2c4900f625a5cf11ff525e99cbe8714b0f105d227b16cc3ef53cc6a3fa5cccb37b8683383349fc046a7db41c7d5121d966a2d7756b1cee72bf68f00957f760ceaf8c5b3e94a2032090d4c052d5e0c5857631f12c3fc4194e5991875bb23a4f8b127c6ebae3d505adc8fed84861161a19fcce5811465be177188e811b338ec0da3d2aec320f587203410a9464c7d89f81e7a5a347c0aa8aa6582dcdc430665ef83b5a06cb11b602245080efd0b3b4f3958b7d6cc0069560856a6d8a8aa71499b04d0a7a44514ec14ec45991e61839c3f319c9b1f3377dc05c5550e6f5961891f0670244f4061884910ddac035a84388aecb0eb0bafb48c77f1cbb074f4198e8235dddf42fd36588441a620d19efc6ebdc9364700567db697e18d3fb999048104dd525eed32d7401219655b1372b2d6d2037975c0df15ae68eca3b35d326311ec3ce387423d969a628b08a021be50ee76246bdae26e42d30cd2e038aa4d67cd9846935b3e06476b11e6d6a4686c9e91e15b2e3d0e54c51e9b27ce97a9351671a4ea8c41de419d2c6b3dbd011ccc20a10f1125705073ee27e2564ba4689a4fedac93d0f76f9d5c575dfd221a4c0b0626897121473af41897d12935beb6cfa1ea4818ac12919879a3fc5305074d143a7a906cbd7c4eddb27880a478f9120c56afa30b0b0fa2e667dbcb842903b4948b0fbf80657d475901109f82e56fbe0736ff59c7fcbc5862b256aa0d47d55f800e7d61ccce648e2461e34c5c5b00e5dc05fdc89e974e9584085e387c613ce36ff07000dfe7a71ef4f24d11925afc2d8b24fe91aa67a12d10ceb78d5fd9be7f43198ecf72eef05ebc0621fc28910103f2a094c14ac47b4d4cbb43e2f1f8d9c558d47c8e895c7572ef730b4a65a340d41e3969d999c351b042f485654303105f8e5734080f1803a89000745851cccd969c423d8c07d6e9599a942030ef9240c1c6a6a8351fb2f3cb6beee13", 0x1000}, {&(0x7f00000014c0)="7c56fb00ee7b1481ce5685473745116ba34c831437a14fe3d36f7469115854b16ba7600481e730b709d4454d2bca15dbf459f864ece1d554f7bad8f02315e610546bafa7a937530d22e52b933559791e27af9566058019ec8b", 0x59}], 0x8, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:57 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryp\nfs\x00', 0x0, &(0x7f000001c000)) 03:59:57 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000200)={0x0, 0x0, 0x2080}) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) close(r1) 03:59:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000000c0)="48b7c3738f845b659957d32e2af14c4dcc804dcff6378ad005ce183ebc4bc6bd646fa8a6c9b5648a21cd3ae79042430513665b51db2482304ba4b7a063fbec3406c1b912b489b0765c9191b404a64cc8ce9f92b924c913f651164a89febfe4b8ff8910cce335f0c758da11d77d7fefdd5f3484743e13e6fdeb106337882f1d0565f7860e6cea32f3ea5fe29ece5462758da093bdf969d15226349eab93188072e9a9741278fabfe51d88586b5c4e43ca4ff8d7ebd3bd765a36c515fb65fe") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000840)={0x0, 0x3f, 0x1000, 0x800, 0x9, 0x1, 0x6, 0x6, {0x0, @in6={{0xa, 0x4e23, 0x5, @mcast1, 0xfff}}, 0x0, 0xa0c, 0x7, 0x1b33, 0xff}}, &(0x7f0000000900)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000940)={r3, 0x3ff, 0x4, 0x4}, &(0x7f0000000980)=0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:57 executing program 3 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xc, 0x20000102000007) 03:59:57 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt\ns\x00', 0x0, &(0x7f000001c000)) 03:59:57 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xffff, 0x4000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r2, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) pipe2$9p(&(0x7f0000000040), 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 412.347168] FAULT_INJECTION: forcing a failure. [ 412.347168] name failslab, interval 1, probability 0, space 0, times 0 [ 412.405312] CPU: 1 PID: 17076 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 412.413869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.423234] Call Trace: [ 412.425847] dump_stack+0x244/0x39d [ 412.429515] ? dump_stack_print_info.cold.1+0x20/0x20 [ 412.434734] ? debug_smp_processor_id+0x1c/0x20 [ 412.439436] ? perf_trace_lock+0x14d/0x7a0 [ 412.443693] should_fail.cold.4+0xa/0x17 [ 412.447783] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 412.452912] ? save_stack+0xa9/0xd0 [ 412.456569] ? save_stack+0x43/0xd0 [ 412.460239] ? kmem_cache_alloc_trace+0x152/0x750 [ 412.465099] ? vfs_new_fs_context+0x5e/0x77c [ 412.469532] ? ksys_mount+0x12d/0x140 [ 412.473346] ? __x64_sys_mount+0xbe/0x150 [ 412.477504] ? do_syscall_64+0x1b9/0x820 [ 412.481587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.486974] ? find_held_lock+0x36/0x1c0 [ 412.491079] ? perf_trace_sched_process_exec+0x860/0x860 [ 412.496540] ? debug_mutex_init+0x2d/0x60 [ 412.500727] __should_failslab+0x124/0x180 [ 412.504988] should_failslab+0x9/0x14 [ 412.508819] kmem_cache_alloc_trace+0x2d7/0x750 [ 412.513505] ? rcu_read_lock_sched_held+0x14f/0x180 [ 412.518555] ? kmem_cache_alloc_trace+0x353/0x750 [ 412.523415] legacy_init_fs_context+0x187/0x230 [ 412.528120] ? vfs_dup_fs_context+0x400/0x400 [ 412.532640] vfs_new_fs_context+0x3f4/0x77c [ 412.536981] do_mount+0x613/0x1d90 [ 412.540538] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 412.546100] ? copy_mount_string+0x40/0x40 [ 412.550384] ? copy_mount_options+0x5f/0x430 [ 412.554822] ? kmem_cache_alloc_trace+0x353/0x750 [ 412.559685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.565240] ? _copy_from_user+0xdf/0x150 [ 412.569408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.574959] ? copy_mount_options+0x315/0x430 [ 412.579472] ksys_mount+0x12d/0x140 [ 412.583114] __x64_sys_mount+0xbe/0x150 [ 412.587110] do_syscall_64+0x1b9/0x820 [ 412.591013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.596396] ? syscall_return_slowpath+0x5e0/0x5e0 [ 412.601339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.606198] ? trace_hardirqs_on_caller+0x310/0x310 [ 412.611230] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 412.616259] ? prepare_exit_to_usermode+0x291/0x3b0 [ 412.621313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.626182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.631378] RIP: 0033:0x457569 [ 412.634610] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.653526] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 412.661246] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 412.668533] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 412.675812] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 412.683094] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 412.690371] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:57 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt%s\x00', 0x0, &(0x7f000001c000)) 03:59:57 executing program 3 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) [ 412.896078] FAULT_INJECTION: forcing a failure. [ 412.896078] name failslab, interval 1, probability 0, space 0, times 0 03:59:57 executing program 0: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{0x0, 0x8}, {0x0, 0x989680}}, &(0x7f0000000540)) tkill(r0, 0x16) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000), 0x0) 03:59:57 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = accept4(r0, &(0x7f00000000c0)=@l2, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x400}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={r2, 0xfffffffffffffff9}, &(0x7f00000002c0)=0x8) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000080)=0xa95) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x63e0d8d5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r5) [ 412.960330] CPU: 1 PID: 17095 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 412.968862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.978229] Call Trace: [ 412.980835] dump_stack+0x244/0x39d [ 412.984493] ? dump_stack_print_info.cold.1+0x20/0x20 [ 412.989710] ? debug_smp_processor_id+0x1c/0x20 [ 412.994421] ? perf_trace_lock+0x14d/0x7a0 [ 412.998698] should_fail.cold.4+0xa/0x17 [ 413.002789] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:59:58 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt.s\x00', 0x0, &(0x7f000001c000)) [ 413.007923] ? save_stack+0xa9/0xd0 [ 413.011624] ? kasan_kmalloc+0xc7/0xe0 [ 413.015528] ? kmem_cache_alloc_trace+0x152/0x750 [ 413.020396] ? vfs_new_fs_context+0x3f4/0x77c [ 413.024916] ? do_mount+0x613/0x1d90 [ 413.028644] ? ksys_mount+0x12d/0x140 [ 413.032463] ? __x64_sys_mount+0xbe/0x150 [ 413.036633] ? do_syscall_64+0x1b9/0x820 [ 413.040728] ? find_held_lock+0x36/0x1c0 [ 413.044839] ? check_preemption_disabled+0x48/0x280 [ 413.049876] ? perf_trace_sched_process_exec+0x860/0x860 [ 413.055353] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 413.060918] __should_failslab+0x124/0x180 [ 413.065196] should_failslab+0x9/0x14 [ 413.069022] kmem_cache_alloc_trace+0x2d7/0x750 [ 413.073719] ? legacy_init_fs_context+0x187/0x230 [ 413.078589] ? rcu_read_lock_sched_held+0x14f/0x180 [ 413.083620] ? kmem_cache_alloc_trace+0x353/0x750 [ 413.088490] ? rcu_read_lock_sched_held+0x14f/0x180 [ 413.093524] apparmor_fs_context_alloc+0x43/0xa0 [ 413.098302] security_fs_context_alloc+0x54/0xb0 [ 413.103081] vfs_new_fs_context+0x446/0x77c [ 413.107430] do_mount+0x613/0x1d90 [ 413.110988] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 413.116545] ? copy_mount_string+0x40/0x40 [ 413.120810] ? copy_mount_options+0x5f/0x430 [ 413.125248] ? kmem_cache_alloc_trace+0x353/0x750 [ 413.130160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.135734] ? _copy_from_user+0xdf/0x150 [ 413.139942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.145496] ? copy_mount_options+0x315/0x430 [ 413.150024] ksys_mount+0x12d/0x140 [ 413.153677] __x64_sys_mount+0xbe/0x150 [ 413.157672] do_syscall_64+0x1b9/0x820 03:59:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/118, 0x76}], 0x1, 0x1000) [ 413.161579] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 413.166971] ? syscall_return_slowpath+0x5e0/0x5e0 [ 413.171933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.176815] ? trace_hardirqs_on_caller+0x310/0x310 [ 413.181855] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 413.186906] ? prepare_exit_to_usermode+0x291/0x3b0 [ 413.191959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.196836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.202046] RIP: 0033:0x457569 03:59:58 executing program 0: [ 413.205256] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.224182] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 413.231904] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 413.239185] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 413.246466] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 413.254611] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 413.262098] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x9, 0x20000102000007) [ 413.315420] QAT: Invalid ioctl [ 413.319166] QAT: Invalid ioctl 03:59:58 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:58 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt/s\x00', 0x0, &(0x7f000001c000)) 03:59:58 executing program 0: [ 413.403181] QAT: Invalid ioctl [ 413.420921] QAT: Invalid ioctl 03:59:58 executing program 3 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:58 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xffffffffffffff3a}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x3}, &(0x7f0000000100)=0x8) close(r2) 03:59:58 executing program 0: 03:59:58 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x80, "598a6eb3d9f169bc844a8e82cc95a77237a0b72b06bcd687f87abd5f52075fe0290159860c94b38251e423636d7dd7a89fe851805ed1881c98a3ae1d4b8d4f2f206428ada3394fb34db195615b0d4be7db77f4be003b074f648000242d1274217f671494b2e3aa1a8748ac39205390e960ade99e03d8bb05b3e96e247ed158a1"}, &(0x7f0000000180)=0x88) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x9, 0x30}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x1000000000}, &(0x7f0000000240)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8100, 0x0) [ 413.643945] FAULT_INJECTION: forcing a failure. [ 413.643945] name failslab, interval 1, probability 0, space 0, times 0 03:59:58 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="6563727970748b7300", 0x0, &(0x7f000001c000)) [ 413.727756] CPU: 0 PID: 17139 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 413.736314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.745685] Call Trace: [ 413.748299] dump_stack+0x244/0x39d [ 413.751964] ? dump_stack_print_info.cold.1+0x20/0x20 [ 413.757184] ? debug_smp_processor_id+0x1c/0x20 [ 413.761875] ? perf_trace_lock+0x14d/0x7a0 [ 413.766135] should_fail.cold.4+0xa/0x17 [ 413.770217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 413.775343] ? check_preemption_disabled+0x48/0x280 [ 413.780401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.785954] ? check_preemption_disabled+0x48/0x280 [ 413.790997] ? find_held_lock+0x36/0x1c0 [ 413.795108] ? perf_trace_sched_process_exec+0x860/0x860 [ 413.800582] ? rcu_pm_notify+0xc0/0xc0 [ 413.804506] __should_failslab+0x124/0x180 [ 413.808764] should_failslab+0x9/0x14 [ 413.812597] __kmalloc_track_caller+0x2d1/0x760 [ 413.817280] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 413.821877] ? legacy_parse_monolithic+0xde/0x1e0 [ 413.826740] kmemdup+0x24/0x50 [ 413.829957] legacy_parse_monolithic+0xde/0x1e0 [ 413.834641] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 413.839416] do_mount+0x6e9/0x1d90 [ 413.842970] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 413.848527] ? copy_mount_string+0x40/0x40 [ 413.852790] ? copy_mount_options+0x5f/0x430 [ 413.857225] ? kmem_cache_alloc_trace+0x353/0x750 [ 413.862082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.867647] ? _copy_from_user+0xdf/0x150 [ 413.871827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.877410] ? copy_mount_options+0x315/0x430 [ 413.881926] ksys_mount+0x12d/0x140 [ 413.885572] __x64_sys_mount+0xbe/0x150 [ 413.889573] do_syscall_64+0x1b9/0x820 [ 413.893477] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 413.898859] ? syscall_return_slowpath+0x5e0/0x5e0 [ 413.903815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.908675] ? trace_hardirqs_on_caller+0x310/0x310 [ 413.913708] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 413.918743] ? prepare_exit_to_usermode+0x291/0x3b0 [ 413.923806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.928687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.933887] RIP: 0033:0x457569 [ 413.937096] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.956011] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 413.963729] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 413.971004] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 03:59:58 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000180)=0x1f, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = pkey_alloc(0x0, 0x2) r4 = socket$pptp(0x18, 0x1, 0x2) fcntl$setstatus(r4, 0x4, 0x2000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r3) r5 = getpid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0)=r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:58 executing program 0: [ 413.978295] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 413.985607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 413.992898] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfffffff4, 0x20000102000007) 03:59:59 executing program 3 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:59 executing program 0: 03:59:59 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfd\x00', 0x0, &(0x7f000001c000)) 03:59:59 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) shmget(0x3, 0x1000, 0x5, &(0x7f0000ffd000/0x1000)=nil) close(r1) 03:59:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf4ffffff00000000, 0x20000102000007) [ 414.188788] FAULT_INJECTION: forcing a failure. [ 414.188788] name failslab, interval 1, probability 0, space 0, times 0 03:59:59 executing program 1: socketpair$unix(0x1, 0x2005, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 414.294026] CPU: 0 PID: 17169 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 414.302606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.311971] Call Trace: [ 414.314597] dump_stack+0x244/0x39d [ 414.318281] ? dump_stack_print_info.cold.1+0x20/0x20 [ 414.323498] ? debug_smp_processor_id+0x1c/0x20 [ 414.328186] ? perf_trace_lock+0x14d/0x7a0 [ 414.332443] should_fail.cold.4+0xa/0x17 [ 414.336524] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 414.341668] ? kernel_text_address+0x79/0xf0 [ 414.346093] ? __kernel_text_address+0xd/0x40 [ 414.350607] ? unwind_get_return_address+0x61/0xa0 [ 414.355552] ? __save_stack_trace+0x8d/0xf0 [ 414.359911] ? find_held_lock+0x36/0x1c0 [ 414.364085] ? gfs2_ail1_flush+0xab8/0x12d0 [ 414.368446] ? ksys_mount+0x12d/0x140 [ 414.372258] ? perf_trace_sched_process_exec+0x860/0x860 [ 414.377721] ? find_held_lock+0x36/0x1c0 [ 414.381823] __should_failslab+0x124/0x180 [ 414.386077] should_failslab+0x9/0x14 [ 414.389911] __kmalloc_track_caller+0x2d1/0x760 03:59:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x3f00000000000000, 0x20000102000007) 03:59:59 executing program 0: [ 414.394614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.400168] ? check_preemption_disabled+0x48/0x280 [ 414.405210] ? apparmor_fs_context_parse_param+0x1d9/0x490 [ 414.410857] krealloc+0x65/0xb0 [ 414.414202] apparmor_fs_context_parse_param+0x1d9/0x490 [ 414.419679] security_fs_context_parse_param+0x5a/0xb0 [ 414.424973] vfs_parse_fs_param+0x1ea/0x3c0 [ 414.429309] vfs_parse_fs_string+0x1d5/0x2b0 [ 414.433731] ? vfs_parse_fs_param+0x3c0/0x3c0 [ 414.433749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.433783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.433814] do_mount+0x666/0x1d90 [ 414.453096] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 414.458647] ? copy_mount_string+0x40/0x40 [ 414.458682] ? copy_mount_options+0x5f/0x430 [ 414.458702] ? kmem_cache_alloc_trace+0x353/0x750 [ 414.458723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.458745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.458759] ? copy_mount_options+0x315/0x430 [ 414.458790] ksys_mount+0x12d/0x140 03:59:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x295, 0xffffffffffff8001, 0x0, 0x1, 0x0, 0x2, 0x5, 0x298ffb49, 0x1, 0x0, 0x5, 0xea77, 0x1, 0x40000000, 0x3fff800000000, 0x3f, 0x1f, 0x1, 0x400, 0x800, 0x100000000, 0xd72, 0x4, 0xe2, 0x4, 0x1, 0x8, 0x200, 0x2, 0x9, 0x6b, 0x80, 0xffffffffffffff54, 0x3, 0x0, 0x8, 0x0, @perf_config_ext={0x2, 0x8}, 0x2, 0x5, 0x6, 0x3, 0x0, 0xb7, 0x1}, r1, 0x3, r1, 0x6) [ 414.458815] __x64_sys_mount+0xbe/0x150 [ 414.458849] do_syscall_64+0x1b9/0x820 [ 414.458897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 414.458928] ? syscall_return_slowpath+0x5e0/0x5e0 [ 414.458955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.458975] ? trace_hardirqs_on_caller+0x310/0x310 [ 414.458994] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 414.459012] ? prepare_exit_to_usermode+0x291/0x3b0 [ 414.459037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.459064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.539741] RIP: 0033:0x457569 [ 414.542956] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.561873] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 414.569586] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 414.576856] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 414.584127] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 03:59:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000940)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r1, 0x3, 0x0, 0xfff9) [ 414.591396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 414.598669] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 03:59:59 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf-\x00', 0x0, &(0x7f000001c000)) 03:59:59 executing program 3 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 03:59:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xd000000, 0x20000102000007) 03:59:59 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x3, 0x6}) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 03:59:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 03:59:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd4(r0, &(0x7f0000000040)={0x5}, 0x8, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 03:59:59 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfu\x00', 0x0, &(0x7f000001c000)) [ 414.963734] FAULT_INJECTION: forcing a failure. [ 414.963734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:00:00 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8, 0x20000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'ip6gre0\x00', 0x2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000200)={@host}) write$P9_RREMOVE(r2, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) [ 415.049901] CPU: 1 PID: 17225 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 415.058443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.067814] Call Trace: [ 415.070429] dump_stack+0x244/0x39d [ 415.074079] ? dump_stack_print_info.cold.1+0x20/0x20 [ 415.079321] ? perf_trace_lock+0x14d/0x7a0 [ 415.083584] ? debug_smp_processor_id+0x1c/0x20 [ 415.088271] ? perf_trace_lock_acquire+0x15b/0x800 [ 415.093230] should_fail.cold.4+0xa/0x17 [ 415.097330] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 415.102457] ? kasan_check_read+0x11/0x20 [ 415.106636] ? zap_class+0x640/0x640 [ 415.110383] ? rcu_softirq_qs+0x20/0x20 [ 415.114381] ? rcu_softirq_qs+0x20/0x20 [ 415.118365] ? unwind_dump+0x190/0x190 [ 415.122282] ? find_held_lock+0x36/0x1c0 [ 415.126445] ? unhash_delegation_locked+0x138/0x9c0 [ 415.131494] ? lock_release+0xa10/0xa10 [ 415.135486] ? perf_trace_sched_process_exec+0x860/0x860 [ 415.140949] ? save_stack+0xa9/0xd0 [ 415.144598] ? __might_sleep+0x95/0x190 [ 415.148593] __alloc_pages_nodemask+0x34b/0xdd0 [ 415.153285] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 415.158396] ? ext4_multi_mount_protect+0x518/0xc00 [ 415.163439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.168989] ? check_preemption_disabled+0x48/0x280 [ 415.174032] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 415.179583] ? rcu_pm_notify+0xc0/0xc0 [ 415.183505] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 415.189064] alloc_pages_current+0x173/0x350 [ 415.193495] get_zeroed_page+0x14/0x50 [ 415.197395] legacy_validate+0x133/0x220 [ 415.201513] ? logfc+0x770/0x770 [ 415.204914] vfs_get_tree+0x144/0x5c0 [ 415.208732] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 415.213510] do_mount+0x70c/0x1d90 [ 415.217067] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 415.222627] ? copy_mount_string+0x40/0x40 [ 415.226882] ? copy_mount_options+0x5f/0x430 [ 415.231322] ? kmem_cache_alloc_trace+0x353/0x750 [ 415.236194] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.241749] ? _copy_from_user+0xdf/0x150 [ 415.245935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.251486] ? copy_mount_options+0x315/0x430 [ 415.256006] ksys_mount+0x12d/0x140 [ 415.259650] __x64_sys_mount+0xbe/0x150 [ 415.263652] do_syscall_64+0x1b9/0x820 [ 415.267557] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.272937] ? syscall_return_slowpath+0x5e0/0x5e0 [ 415.277881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.282742] ? trace_hardirqs_on_caller+0x310/0x310 [ 415.287797] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 415.292837] ? prepare_exit_to_usermode+0x291/0x3b0 [ 415.297888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.302781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.308005] RIP: 0033:0x457569 [ 415.311212] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.330121] RSP: 002b:00007fda982f5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 415.337838] RAX: ffffffffffffffda RBX: 00007fda982f5c90 RCX: 0000000000457569 [ 415.345122] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 [ 415.352401] RBP: 000000000072c040 R08: 000000002001c000 R09: 0000000000000000 [ 415.359696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda982f66d4 [ 415.366989] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000003 04:00:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x600, 0x20000102000007) 04:00:00 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372797074668b00", 0x0, &(0x7f000001c000)) 04:00:00 executing program 3 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 415.561854] FAULT_INJECTION: forcing a failure. [ 415.561854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 415.573715] CPU: 1 PID: 17247 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 415.582218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.591582] Call Trace: [ 415.594196] dump_stack+0x244/0x39d [ 415.597854] ? dump_stack_print_info.cold.1+0x20/0x20 [ 415.603073] ? rcu_softirq_qs+0x20/0x20 [ 415.607069] should_fail.cold.4+0xa/0x17 [ 415.611147] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 415.616269] ? kernel_text_address+0x79/0xf0 [ 415.620710] ? __kernel_text_address+0xd/0x40 [ 415.625245] ? mark_held_locks+0x130/0x130 [ 415.629522] ? save_stack+0xa9/0xd0 [ 415.633168] ? save_stack+0x43/0xd0 [ 415.636817] ? kasan_kmalloc+0xc7/0xe0 [ 415.640725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.646278] ? check_preemption_disabled+0x48/0x280 [ 415.651320] ? vfs_parse_fs_param+0x1ea/0x3c0 [ 415.655839] ? debug_smp_processor_id+0x1c/0x20 [ 415.660529] ? perf_trace_lock+0x14d/0x7a0 [ 415.664792] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 415.669394] ? retint_kernel+0x2d/0x2d [ 415.673310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.678867] ? should_fail+0x22d/0xd01 [ 415.682767] ? lock_is_held_type+0x210/0x210 [ 415.687206] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 415.692673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 415.697799] ? perf_trace_mm_lru_insertion+0x1028/0x1490 [ 415.703281] __alloc_pages_nodemask+0x34b/0xdd0 [ 415.708167] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 415.713197] ? check_preemption_disabled+0x48/0x280 [ 415.718238] ? find_held_lock+0x36/0x1c0 [ 415.722332] ? perf_trace_mm_lru_insertion+0x1028/0x1490 [ 415.727830] ? trace_hardirqs_off+0xb8/0x310 [ 415.732267] cache_grow_begin+0xa5/0x8c0 [ 415.736499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.742050] ? check_preemption_disabled+0x48/0x280 [ 415.747097] __kmalloc_track_caller+0x69b/0x760 [ 415.751795] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 415.756401] ? legacy_parse_monolithic+0xde/0x1e0 [ 415.761263] kmemdup+0x24/0x50 [ 415.764484] legacy_parse_monolithic+0xde/0x1e0 [ 415.769169] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 415.773940] do_mount+0x6e9/0x1d90 [ 415.777676] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 415.783232] ? copy_mount_string+0x40/0x40 [ 415.787494] ? copy_mount_options+0x5f/0x430 [ 415.791925] ? kmem_cache_alloc_trace+0x353/0x750 [ 415.796798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.802363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.807921] ? copy_mount_options+0x315/0x430 [ 415.812448] ksys_mount+0x12d/0x140 [ 415.816594] __x64_sys_mount+0xbe/0x150 [ 415.820604] do_syscall_64+0x1b9/0x820 [ 415.824522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.829903] ? syscall_return_slowpath+0x5e0/0x5e0 [ 415.834845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.839700] ? trace_hardirqs_on_caller+0x310/0x310 [ 415.844755] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 415.849817] ? prepare_exit_to_usermode+0x291/0x3b0 [ 415.854858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.859727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.864923] RIP: 0033:0x457569 [ 415.868127] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.887037] RSP: 002b:00007fda98337c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 415.894759] RAX: ffffffffffffffda RBX: 00007fda98337c90 RCX: 0000000000457569 [ 415.902055] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000300 04:00:00 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 04:00:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0xc) r1 = getpgid(r0) prctl$setptracer(0x59616d61, r1) r2 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x58ec4d77, 0x86000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000003c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r5 = getpgid(0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r8 = syz_open_procfs(r0, &(0x7f0000000200)='cpuset\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r8, 0x0, 0x487, &(0x7f0000000280)={{0x0, @remote, 0x4e20, 0x1, 'dh\x00', 0x37, 0xd2, 0x42}, {@remote, 0x4e24, 0x10001, 0x0, 0x1, 0x20400000000000}}, 0x44) write$cgroup_subtree(r8, &(0x7f0000000240)={[{0x2f, 'rdma'}]}, 0x6) kcmp(r4, r5, 0x2, r6, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r9 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffffffff49f9, 0x8800) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400204) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0xfbffffffd, 0x10000) [ 415.909340] RBP: 000000000072bf00 R08: 000000002001c000 R09: 0000000000000000 [ 415.916626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda983386d4 [ 415.923907] R13: 00000000004c289b R14: 00000000004d3c78 R15: 0000000000000005 04:00:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfffffffffffffff0, 0x20000102000007) [ 415.965627] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:01 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf.\x00', 0x0, &(0x7f000001c000)) [ 416.064766] Error parsing options; rc = [-22] 04:00:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)='keyring:$proc[:\x00', 0xffffffffffffffff) 04:00:01 executing program 3 (fault-call:3 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 4: socket$kcm(0x29, 0xfffffffffffffffe, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x8000000000005, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x80000001, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x3d000000, 0x20000102000007) [ 416.253910] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:01 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfc\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') [ 416.344722] Error parsing options; rc = [-22] 04:00:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 1: socketpair$unix(0x1, 0x2000000000, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4103fd, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000000)='V^', 0x2}, {&(0x7f0000000100)="e8dec985750d79ed45c621d4c2d7c2233341c48a669a7fea66979e18306fe382476c44eb9a40a1420bc77ac11476795494b665cb410057531c6689f8ced9bb1b5ccdb6e63e398cb6c0167f69a23f5cd3f71bc0806fdeb34707af64c8d40ed6322ee9adfad2e79a", 0x67}, {&(0x7f0000000040)="93438bc8c817aec2d7388e42dda4379d3d83c361d3ae923b74d44b1363e66d8efdc5338ba5c7472803b226", 0x2b}, {&(0x7f00000001c0)="e81beaa54f5adaefb11d6d2157c58e52236d7e1b40b485b271cb8b453834369c19096cde27107f631640b42f0b43fe1d2a41a8d945d79902e064f419805b70e90fe1b991b75e08037788bab47ecff9598a09d82cc3d8c6123c21c02e936e7aa919d8026bf6901bed76a7f32cd5f39c9ded27dffdd7991d549414cbc0a63906c5684c955fa14cc547ceb35d470f04435eed8256bf132c2413e774bc57", 0x9c}], 0x4, 0x0) pipe2(&(0x7f0000000180), 0x84800) [ 416.523459] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xd00, 0x20000102000007) 04:00:01 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfX\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000080), 0x3) shutdown(0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) [ 416.574123] Error parsing options; rc = [-22] 04:00:01 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000000, 0x0) bind$vsock_dgram(r1, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000040)=0x0) r2 = dup3(r0, r0, 0x80000) openat$cgroup_int(r2, &(0x7f0000000280)='cgroup.max.depth\x00', 0x2, 0x0) io_pgetevents(r1, 0x1000, 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={0x3f}, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='\ncryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001780)=ANY=[@ANYBLOB="a54082a30afc481df2c78eee1eeec6851cecd31ba111af4ac5dc047c8ac469670a9f9229cf5bc1ffca2ca0df848af24c4c619176361fcf2a61860cb761fc8063374804fc9c69e42ffe27d96124867a6f32edbab905c3818706823c8e85c7d76d5328362b18"], 0x1}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002700)={&(0x7f0000000140), 0xc, &(0x7f00000026c0)={&(0x7f0000002400)=@flushsa={0x14, 0x1c, 0x23}, 0x14}}, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$dmmidi(&(0x7f0000001a40)='/dev/dmmidi#\x00', 0xfffffffffffff800, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000240)={0x1}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000001600)={0x79, 0x0, [0xfffffffffffffff8, 0x1, 0x22d5, 0x3]}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f00000001c0)={0x0, 0xc804, 0x6, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000100)="482e2cf215c6", &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000080), 0xfffffff6}) r7 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000000c0), &(0x7f0000000280)="19", 0xffffffffffffff09, r7) r9 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000500), &(0x7f0000001680)=0x4) r10 = creat(&(0x7f0000000100)='./file0\x00', 0x80) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pipe2(&(0x7f00000016c0), 0x0) write$evdev(r10, &(0x7f0000000440)=[{{}, 0x5, 0x8, 0x3}, {{r11, r12/1000+30000}, 0x17, 0x7fff, 0x5}, {{0x0, 0x2710}, 0x16, 0x0, 0xf1}, {{0x0, 0x7530}, 0x0, 0x1, 0x4}, {{}, 0x17}, {{0x77359400}, 0x16, 0x2, 0x1}], 0x90) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r8, r9, r8}, &(0x7f0000a53ffb)=""/5, 0x3ca, &(0x7f0000000180)={&(0x7f00000002c0)={'sha1-generic\x00'}}) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x1000, 0x8000) sendmsg$nl_xfrm(r5, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000001880)=@getsa={0x9c, 0x12, 0x20b, 0x70bd2c, 0x25dfdbfb, {@in=@local, 0x4d6, 0xa, 0x3c}, [@algo_comp={0x6c, 0x3, {{'deflate\x00'}, 0x120, "b2641766e658b32354e35438c31142a3564e9f398ddb167f2a033a9e58b58c778eccffc3"}}, @tfcpad={0x8, 0x16, 0x1f}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) 04:00:01 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfl\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='%cryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0xa0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0)={0x0, 0x6, 0x10000, 0x3, 0x9, 0x2, 0x100000001}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:01 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfo\x00', 0x0, &(0x7f000001c000)) 04:00:02 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x2, 0x81, 0x3f}], 0x18) 04:00:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1b00, 0x20000102000007) 04:00:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x800, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x8, 0x0, 0xfffffffffffffffc}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x20000, 0x80000) close(0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x20, {0x2, 0x4e24, @remote}, 'veth1\x00'}) accept$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r0, &(0x7f0000000640)={&(0x7f0000000180), 0xc, &(0x7f0000000600)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000001100020029bd7000fcdb0000000000001999b545e1bf68445d4941911bdafac04ba43278c56c5d09abf5d4d436219bd8f4fedf8b955ab7b08393b9b96998bee4b43771767431da785cf34af137f1b5ba7be309bb30bb92cff1c0c9abe7d4bb503a904072551fe9da8f244eb14f0b319823ed018381fb533a48add73859a3173fba2301b4af1ea0a006cc5b48", @ANYRES32=r2, @ANYBLOB="00200100a20e050024000e000600000000000000fdffffffffffffff00000000000000000001043f00000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x40080c0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 04:00:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="8b6372797074667300", 0x0, &(0x7f000001c000)) 04:00:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40000, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xa16) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) 04:00:02 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf+\x00', 0x0, &(0x7f000001c000)) [ 417.203020] audit: type=1800 audit(1539662402.170:73): pid=17372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16559 res=0 [ 417.285133] audit: type=1804 audit(1539662402.170:74): pid=17372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir636744980/syzkaller.DBfXbw/421/file0" dev="sda1" ino=16559 res=1 04:00:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='e%ryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:02 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4000, 0x0) close(r1) 04:00:02 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf0\x00', 0x0, &(0x7f000001c000)) 04:00:02 executing program 1: syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) sendmsg$can_raw(0xffffffffffffff9c, &(0x7f0000000140)={&(0x7f0000000040), 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=@can={{0x0, 0x2, 0x7fffffff, 0x80}, 0x5, 0x2, 0x0, 0x0, "7c554d71f7759bda"}, 0x10}, 0x1, 0x0, 0x0, 0x801}, 0x0) 04:00:02 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfi\x00', 0x0, &(0x7f000001c000)) 04:00:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x15, 0x20000102000007) 04:00:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="658b72797074667300", 0x0, &(0x7f000001c000)) 04:00:02 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffffffffff22, 0x400) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/243, &(0x7f0000000200)=0xf3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000300)=""/22) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 418.173595] audit: type=1804 audit(1539662403.140:75): pid=17372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir636744980/syzkaller.DBfXbw/421/file0" dev="sda1" ino=16559 res=1 04:00:03 executing program 0: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={'IDLETIMER\x00'}, &(0x7f00000006c0)=0x1e) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000080), 0x8) socket$nl_generic(0x10, 0x3, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000580)=0x8) fdatasync(0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f0000000040)=[{}, {0x6, 0x400, 0x1000}, {0x1, 0x0, 0x800}, {0x1, 0x4, 0x1000}, {0x2, 0x7f, 0x800}, {0x3, 0x4, 0x1000}], 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x400448c9, &(0x7f00000001c0)={0x1bad035, &(0x7f0000000480)}) 04:00:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1b, 0x20000102000007) 04:00:03 executing program 1: socketpair$inet6(0xa, 0x3, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'vcan0\x00', 0x0}) sendmmsg(r0, &(0x7f0000003280)=[{{&(0x7f00000000c0)=@l2={0x1f, 0x6, {0x9, 0x3, 0x6, 0x4, 0x21, 0x2}, 0x80000000, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="778264530b5c7fa91a8cfd6aa9a5f7", 0xf}], 0x1, 0x0, 0x0, 0x4044}, 0x7fff}, {{&(0x7f00000001c0)=@llc={0x1a, 0x319, 0x5, 0x1ff, 0xfff, 0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)="106f884615ce3668be0ec88399126efe81743b335852011bbb06bc7f518a25c441bc1c2c88e2a0924b0d81520ce7e7f65d23084abef08288cfcd138882d0fa7524ebf3eeef39a575ec4a909e0685fc117f4b82a32ae5ecf2cf87aa4d639616da4771d0250b541adba16834e6b4cd2624911a34d067b892bbbec73fdfb736576a75427f15861740e7a50329df6f8b03a8f7bc4888b79ada0fb8a2c7ae5e23c90b78802483cf984b2c20fc0ef1e9815a7ee6fdb1d18dfcac8833103c333e1600623ac6c3741738ec62c1b7eb7490b8bcabfbd774f1", 0xd4}, {&(0x7f0000000340)="6032713b15a4bb0af52d0b9ffb488edc83f1654180cd6b113774d48f7c37a321b18f3fd112cd", 0x26}], 0x2, &(0x7f00000003c0)=[{0xc0, 0x112, 0x20a1, "f3dbb364eb1c680a81c6af809668706de9c84aff2131d8bddb1dacc7b770ef7dd315d081271311a80370d4dc6ee270546a17b1801f147b3b5620c2160b76098913e24cd32859e9de7f5eb15c0bf0888ba896873dd1ea43ede799ef37c51e80f458de786c6a218702c5da1520d1b4ed3a3cb0a11303d6b95c5f6c72589f56e40439bda5703b51bbe461e536e32f3eee34470589c24e51cfd35da319eb52a816b43327dcee1c35ba8a7d14a07991f3848c"}, {0x108, 0x18d, 0x7, "f664fdd123d06bc8a8d8cf459d6a3b9390d0c60c6b0c9ea98e0cabdc4f750e049e6561f64cb7f76d23c25c2ad4aa854c60320f979d55e66990b1bab55ca739fbbe9d2e94a13c909b2ee2ee4420a91a6c6fde1c46882f9df63f6255c60d017863f0e097c5cb7d8a32c3e9ddd81b96b9c34525cf4843d21a2fcc617be921643382ba985c43a48ffc7e1824ea71cc54ffd066bb88d32f96e8f2bc5c6f6fb714e71dbf248e899afaa718fc79044296ee0255f6f344700a1a1d20348997aa6aa2572622a224c1d422330ec51c4d95a9dfe83b406c28d8b4feafe191642a40f48ad6d28173cd4473305884d544f27cb5bf5072a0"}, {0x58, 0x1ff, 0x7, "0fa559b509ad78a851b3e87f53ec2ed23dba0408b93543b5087a3ae00a28ed555cdd51e196b9af36986fb49666d79562762984c6a76513c01a16c270ee47462bc2"}, {0x58, 0x10e, 0x7ff, "8347b1092f6c0cfad06daaa19eca61f156057c0c0bdc245b52adff45db98cdb45474823462aad52cf63b80d572b83d63e42567f71aaa2987a69db455098f045cddb3"}, {0x90, 0x13f, 0x36740, "99a1e738c60b494dded8c479f07ec468b42795fb726345a63a2e51c21db39ac90c66e3c14320eb9e47489a3fadda7734940413782cecd3b42ed99889eccaa2fe47b775b2ec974b830aeb4d09c0533b33dd71fb59ed0ab89556bf88df634eaf8738bf1694638b427ada6f464406e9bb7a87be9bb3e40154fc82"}, {0xc0, 0x11f, 0xfff, "1c5ce3d2b742143410d4a7e37d9df977e5b8a668c01a4270184f7cc7f442f2b18c2402d1a9d7c04f373cf3b1bd06318c2ad1c6ab90fafb25d10accf43d166a47a23137f36fb89f9bacea67beb99def69a57891a3ea9039000f362342f27743957a998db8d0ec437bdd381e43f29abe9a41bf113a5ac73fd35ff0204c67aab9207dc99464ec972db057b5e87068630189af349fd27b69e1b5494bed6078fd95088f17066c58d777e0efdc"}], 0x3c8, 0x4000000}, 0x55}, {{&(0x7f0000000d00)=@ll={0x11, 0x17, r1, 0x1, 0xfffffffffffffffc, 0x6, @remote}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000000d80)="d0bf4f6b1ae56dc8d0e8ce469ea7b20f469dd75c8e1495a7", 0x18}, {&(0x7f0000000dc0)="14d522cebcd7345b27108de306b85b2a9202b14070ce651176028d", 0x1b}, {&(0x7f0000000e00)="e44464a585857859a304659403b55b14bfd46e78f6746f908793d1c19a35555b20ff2e6e3455403adb08cc6f56e06623f73d59b5e831ddc0c450d8a6928cea0132373bc66725dcc407c2448a344cce305dcaee05741b12d3ce1171f873510caa62e7b643fcce3e03a92106dd13b6e140876d35ebb5d36c743d6d637381a0679579637c9eed5414dd77bf00b9a21ebe781b62d5fac4453b1c5cc625206434aaa20851af922168e0a4f24b83e2112523ed676ef9983b5de3601d1fd36830b00c5f3f73419a1ff3c09fb1c78b5e92a4e22f24ac5ca9cb3ef2b159ac1a0d192c253e82d4669221b29d5c4f5e2b98c1f207a3360626cc6b788e45b798aad798c5a21d4cbfb6d47d8cb0b7136bfb327c14889963c946b8a208af1ee5d6ad92f1abc5755cae9a8f2312d153623ed5e5f5aa0afd3f9e9c27e5190de7a29b220fdf6e2fe3eaec804b677556e0916d2899f6cac8ddb3f03d6d5292f7a36f97bd3faf05579b249be0584d164d49c73eca10941f3c73681c85a5ada147d0a793b13fde23ed05837ae578812f6cf92d0d5aa7ee5ed986d96bfe3b382f142518d286408c020edec5820c8f1a420fd081495d52d0bbea921271b5b01cd19d7f766db464975b70104de06b8fa1cb74eacd76f74a491f8cbb86d3d191521fb7f25b55a7e7905f952ae72dd5c795a4573d153897b516d3fcafe3cba9f099012bf8616d079b94195e033a8a9a49817ad3906485ff4d7d1442d23efc40624c81fdca68fac90b0f98c0080939e057d2bbd86f6d51f09200ba7cad44a34d424132596f2bbfccea7b9d8822185374bef6a1f14242caacaff2e5278b0d7cef328cd844bbf10870b563f37aad221796c3f2caec9ba7d52cc0f40b19166f9313d7cdbca7d4dc98ff6446e97b5c72968ab9fbeedb22d8730208204446e443dc2fcdaa5ff0314a06b4ed33d8600bbd1431656115f31be85d5cba8c5b336ba9b48881aa2c16dde1f241d1a4dc654d7ac9b4b17f5ad546a07d4bc81b799bf87e82cb20620d3fb25731ea78eab1b5051f0272bfe666fd2fb15c0e4a064fd7b18cbc279a0dd1c0b3043a58fceac0750501935dcb597aa61e44e55018c1b806c6713423d6a765dbf1b037ee2ffe8973824580965f560c20af91f3595baff2c8e5b466e2ac95c46c321b875e09bf25f8fe82aa356ff4df8fa9cd56588edc8240bf293f20e03785e6a8dbeca145759503744ac3516cbe3d8f5727ed3aeccaeb8cdd7668d038cba1e8d17155671e6cb98076c50a2336ea9f100913b27ef50e50e6bafb0fbe6fd309d57dbdfb83e2774f2831d1c3289643013f819f729faab7fcb614fbfa8183f758b863b3a59d0cbfe3f658078a0cd598f876dd1cab03d6f0e050ce69006f6152c62a7cda52bc29ec087e1e7263fb4d50ce076cbfb2d8d8d7c3378e711d3eaaeefa8c1601389c9b4d142d9d34994b42dd1ca242fd628d29b7d4538876b744799cf6f91c8cf94ae77431c953a6ddc3c4a11c4fa868a781374f8a44f9561611e87f0dff7c0439dbeaba451caf128a2e7850ec02816ab33d74dcbbd5dbca2b9acf701fd7f116d4f1eca73b867b49c388a25a0b154b2eda3a1e59b86741708a259eeebc07f852f1f84a858af3961757bfa2f3a311562361e868d8e867c419124c6468430e3bc9df9cf9929773ff0e6fcdb511c54b17476aaa76c89eda35aec0f5b56f87bc318a0f27029d32aad82b91be734ee4f36038df669117d9fa66eb1a61da923fcc52761c104ac06c3dc265f4b96a502de902f0dc5bdc6e33edc2faa131a6ac40005172749f0cb138cff4a3a2829fbfe21674735ef229f68080d651bc1af66ff3fa83353f3331061d22ce512b68c3d4723d9a99d8c265610f2947d672fe25d2e0cea7d9521f6ce8049063fcc8d6f84f7d3db0d81284e13a92f6a86c39253b4a11a006bcc2af273552c0d66f27f6f349163e1cd666edb2a5ae01f7af6c992f0735fcc5831c0938a8cc3aacc206ea7cab0f6b98ebac4da83c4e6fa8fcf90355675fd62cde816aa78dd0e7ea6e4f814043f7ecdb91216e797cd3569c3e2e4f053af86d2704e8af200bcb1224f9ff2db4f2fedee41ec4fcf2ee2a102141fcc9891537b665b5a0fed24b984fc0700f504b79a249df05f4111e9aa62638d223648d7425aba7fe74bfd22c9665be85223874a7ecc2a0c4121e5709684ccbef25267af77845c91a106ab20cecd887605e92b3eee5d1172f3815231256ec8bcec18dbb8afeef17ed5601af6de02e9cabd2bf4ef4da4d8e59b22bf7301f9301813a72c5f3db933ee975add1f567302a42b87c0258ec539e6849eb67fc88da378db3a193ea4333ca15204e61e46e01a7d572313b4c57dd646c055359c3edc690c3d3ef6989aa8b6fd2c79707ed58fd82322a72544269e140e01bf6476363acb115081ef2601be903b0830e15b4024ea060c7d0aa104f449c013f0708d8720d83af1f9e1b70f9f631d6170e817ce2c02778019fbd2d268ed9c69e08d6bab35c69d3bd73b98f88dd12bfa1eda4b60ea635a8a0d97552bf3df211a9ea877107cc137f7bd8a7fb641d4cb0ec15bc89b340785cad98755eebd97ea980a2828b0752c4a1c23925f3bb3747333f82d58f4f19517f882cdde97401e0f4483370e35ba2283ddc796c8ef52cc002f9bedd2fff1436a304da32a70950079cdc9ea452763e81e75dafebf5537088dd9b7bf1841e562c62f677750627decda2d885b0710eb5d819d398041c1afeb7b78c713c5d5351c2589acc3fe6c75b648156a8d19ae4016abc5766bd65e2709d038f422c99243a1bd80cfc68099f37bf6a9d35b3c3b5fafe0dfaf7d8df0c15c7b80b78afd5131fcf8a999b492adb92e2dd23bf4acfec8abc207c56061c03536c5b314596a6a19dcbb855feb7b17c636e332d1b69780cabe563f8a5136ec0e641dbc1c9f553842cc513ac2fcaa6da493c10acde03e699d482742636aead14508f1ea753ee1adbc7c3d3f20eb2c73c9b3c3b455e1d7cb688eb75e315a002941bff54b31b5f064819284b765120585195f0d22050c7457cca035bca7ed2abedd26a18078eab912bfd9ee079109ed0c76a9fc0f2bf8d4871a924edefb10174f63ecc24a487f3919faa61abd9218ddf69a85869e284a15cf154d2fdcb5fbf1b7a0544da2f289e38cb0f4322385abea9b880d8e7eef63eb4745bc8ce7aa0e6ac3d6a4ce0b8ff1a21c55dcf713f354330bd7182cc0c643b9c9ba3e3a37a0225f3b64a64a9742baca3cd6fbde793d09870fe4433875179a9f95352b3d4d6475ed29a7f14f14143cf6cc7ad0bac34a2b563b25de881e2caa1686007dbe5b1c89fc49d0b1f531f2e5be5a7c04c8313e464d53bee172d267d0ea276449a8047ac9d3ba54e5bde29ea142b22eb308b4e5968603f862da83e3b8d67d35c98a3231e4c85769d46dce8dcd97b86f427b1f43fddbe846b7cebba891ab2e4ef9f61199e0359070e9edf43c84fdd61c229ac19cc9a7675d6321557146a4e33c8e83d2446b0820b29ab5227bfb4a17028f8d6d7fe06c86b81a22078d47a14764cf6a0d2234f111a405e7362e07b5d0ba1bdbe45efa60d8b0a0c2465697129d79d77a30943515e2e75280f3d48c28eee5efc7d6fb9e9ec4e1bccbb5145c590a4382b144d50357be09b47c3ca7d13cd336e2bbfd03f51fd095ae9b227f5068567c5ba06a40d82c1787915f3f9929fb4882f917481fbf27a567fe9421269fe487064e1c8da1a006728a7494972bc24af3f42fcef7efe5e199e148289f9936321d6084f293061c829478161ee71348e1294996f45d3eec427ceb3adf3bbebc3724f08694ee8a3edf20e1489233ea9a3f57aa7c3926fcc6640f54449e33d604505654d380dc2bace2f91752be531b71bb2685c145f8e459f0118fbfccca2ef05306c7484c255a9aaf39bd599a9af2465a512152d70b070f3167bb9015132f029ec06308fad7047649c4c572fb1ac59fa10d4384951c59722bb0787de0b93dfa4b3e3c05cc8dc2ed463f293f5fce3f07e909fe85b636e0cfaedfcb98336b909328728fb3da560b7ec8e67563aa2b14216cce23737f93be83d4033fa462158352f3b586bd30b77a6efa9c5bb295e6dbf0dccb72d4b7499738bfeab5c2f9bc21bb67802f316d337ddd1f999b206c4cdc9ff2acee2b584cbe5c57a862f0244b8139dee196f7e210d73b26233ed06cd2216d16a339c8b7c324c7828e12641b0a14c4b1a3a15270a3e0c070c8f512273ce528c68f196d886662b1a0eb5be1e6a20be1fee0f01ff387ddbca169f5ed8e4a97c6a8b259326780233672f5e17c15433cad64995b176460eb4cafb251a99451982ce8aaf30dda9790bbdd9737e6c86c616a82dd9bc766d9775192ee5b2d906ca478115dcdb9634c7e3f73fe594b46dd05d04f5dd96882d86be1d142e5a2ce61734663e29e6ba829507c57799747ba00b226cee6a5ada403d8d466cb55b09846a1ac41d9a55e942c561933dc492767ba3334fb104e24299c4ceee6c9af31ff919d5e9e9e62eb3e71389dbdb5383652eb9d34e66f088e859924ea73df49c23fcd658c8251eabe4ff1dffed09e11c2f1937205e41ce1465669733b4a1cf2a70b46dc6fc8b5d3705a6099d26a62111da1c063173637041c009e82e55618f16ad909eafd0b3877e46d326420398c94d5293d06cefba938ee20e1cef267643e83bfffdd7c050f05843e61275f4c03f6ffdd6a65f8833d7e73d9f63483a4f4f9e649d3ee2c9108aed1c04b23677322ae17e7cf6d078ed8a609eecde71d692157e3e63913503170b0a06399e7ad599ce2fab5fd640216d6eb8932acaf9a411cec92628f906334026b3ab9fd760494ef394679d640fcea7ddf61ec67199c486d1b98e5a6b22c3ef9a6046b1a5bebbeb251d29d8024b5d12e523d4139eff1843328d261671d0a0319d27822442cf8edb383bbe7b3106932191f1b75ca60ca9b3c40b7a9cd844ed166f1a88fed9223260fdffc532d0233eff7e730a3c83db96c05927d6a8e5065b414625c58befada9dc91925b66a33c9dea2206a05346d9a43686d01a74aaa2d722561f0a145b9418079d8498dd4b48f2fa66186382f21a82831162e2cc2933c77acab06ea4cb7d56ef0e6d08855c5dd0d8118a2699e07d4d169002c627f8605b9d81b0d9a01f46a135aad6d3722d687e98c8815115ee6875fab36775c5e2a4cad19d4b610d3587d317903a4fed3ea1340cfd9c204315f18e2e00cd9b31e5e524aa82742ae5a968d9aa1b85275fb77017a185228dcc6fc2d2ea455203400d688986f89fa66a1a6376b2b8ae2e3239ddbe0a8b7868bfb2893c443742bf2896f5232d777b337cbd3a4a6d453b861ecf28f6f2f8b1b34dccc78ecc531df8de08b90d252d315a1dc65fb6e943be568f7b346c4cca2f7f57da97eb9e78b48e31be6c61bb960706be5334e28653b6e9519409e4a536bc85a1470f35e7310d3805a448d44f316bbf6d1f19c0a395ec7fe8fd9c9637bb8ab957d320dfe506bbfda7342c105857575d4ddce4161663e2969794e71bee2b63bef59045bde41de6d6d049edb96ff10c68648ae328b569b13e1b246ad8a2b8dbebc45570d722b6f4d88dcf08b2befa19a1d3798d23b8107f4991015dd3af0b206109577ffbef2859e9b994ba8722ac8c5c2b47455ca11af1b2da802fd6f83f8cca7163be75447bded628386d1de5bd37174020fbd730d99edf2337659c01249541a41681c01b27d495f141931790523f62580b88b3b4ea7cf6fa2a66cbf2490144f91ddea2e87769d5c7601c650a734c53", 0x1000}, {&(0x7f0000001e00)="7223d93630c038518ef3ac4d63accafce7a791ce52c195821f53c0bebb5ec4797033e6f7400928e24752c23ca84348b6d91aca6c9465ee59dedc5d8116a8057cfc70776121a1e3d217335ff8aaa326811b9ce67e5741396b09720e36781a8aa84c5a69b5c422193b", 0x68}, {&(0x7f0000001e80)="548e5b7e0c663a184c7e674eece4a3532780b642ab60e58fbe7a34eaa0e0c34820b38250c7a3b4bbd6a742f25dfb555fe4c1814ff8b5a6c6fbcb1622135250a4fea14a94bc4010088fb7947f4b007444a09900f937d6057fcacb15c96c7a1b82dd7a2d32af2ad7fd74d0c4095c101f764f7bea0df02bdba14f334d6258359db2e00bd21bde72f906", 0x88}, {&(0x7f0000001f40)="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", 0x1000}], 0x6, &(0x7f0000002fc0)=[{0xf0, 0x107, 0x5b, "3125e9d4832b3ce9bf41f99e9db64831be374f9092040b1eafc680ab302dbf9d2eb95c9b7b7b8d1e2d412aa3761c96a762fd08d7c78da782b00d506ef40b210a184e8712581d909479e6b41df7516316d0c940ef4ba326f91c1b313621d473e3dd9734294e4e6fe7c446c0446293fdcadecfb57261b31bd29e48bed61fc08f5cf1d7ce075dedfcad070a20e6b00c616349282a8f6513d8e32856880b8106d39a1b3f65f03d61955e324967a11b47f1908d76b8a2a5dba47dae6c2e9708ef7ec1181461e19242774b70c296f9f84b1fd37b151d365613c6a014295bcdd7"}], 0xf0, 0xebcde505dc037dcc}, 0x800}, {{&(0x7f00000030c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x8000000}, 0x80, &(0x7f0000003240)=[{&(0x7f0000003140)="c53731869fad9544b5ee1d6d54d223e319c1d9a037cd808c6c237064d1c52e39a29e620c54ff9afa5bc24f08a1341c8b0c027f5f3767c3067d4ab41ae79fe81053c3dde37445b340efa98e207350297e281231d93ae63e46c5bdee2358cb6540274a54ba76ba7e295050fde18dc9083f2927742763b57d53cf9672e7ac869e23ba45bb9bc63c3124af7d", 0x8a}, {&(0x7f0000003200)="baedab0f578ef49d7b251fac9dc7ea49854b8f90dbe5", 0x16}], 0x2, 0x0, 0x0, 0x20040814}, 0x5}], 0x4, 0x4000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:03 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfx\x00', 0x0, &(0x7f000001c000)) 04:00:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='e\nryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:03 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x200) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x880, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2000, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x4100, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x180f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x20000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:03 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e24, @remote}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x2, "e5ef"}, 0x3) 04:00:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x40000080806, 0x2) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x2007) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/168, 0xa8, 0x7, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x70e000) 04:00:03 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 04:00:03 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf\n\x00', 0x0, &(0x7f000001c000)) 04:00:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ec\nyptfs\x00', 0x0, &(0x7f000001c000)) 04:00:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1e, 0x20000102000007) 04:00:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2c00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x16}, 0x2}, {0xa, 0x4e24, 0xc336, @empty, 0x6}, r1, 0x7}}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffff81) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ec%yptfs\x00', 0x0, &(0x7f000001c000)) 04:00:03 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf%\x00', 0x0, &(0x7f000001c000)) [ 418.768576] QAT: Invalid ioctl 04:00:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x5, &(0x7f0000000080)="153f6234488dd25d766070") unshare(0x400) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 418.822564] QAT: Invalid ioctl 04:00:03 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x800, 0x4000) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000080)=0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:03 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfp\x00', 0x0, &(0x7f000001c000)) 04:00:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)=ANY=[]) fanotify_mark(r2, 0x58, 0x8, r2, &(0x7f00000000c0)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000140)=""/71) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) 04:00:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="65638b797074667300", 0x0, &(0x7f000001c000)) 04:00:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x2000000, 0x20000102000007) 04:00:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0xfffffffffffffff3) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000300)) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x44801) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r0, 0x0, 0x17, &(0x7f0000000380)="73656c696e7578408b6d643573756d7472757374656400"}, 0x30) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x71, 0x1, {{0x2, 0x3, 0x5}, 0x9}}, 0x18) syz_open_pts(r2, 0xc00) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x100) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) 04:00:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x280002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:04 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x80000) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = getpgid(0xffffffffffffffff) syz_open_procfs(r4, &(0x7f0000000080)='net/route\x00') close(r3) 04:00:04 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf#\x00', 0x0, &(0x7f000001c000)) 04:00:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x13000000, 0x20000102000007) 04:00:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecr%ptfs\x00', 0x0, &(0x7f000001c000)) [ 419.222168] IPVS: ftp: loaded support on port[0] = 21 04:00:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept(r0, &(0x7f00000000c0)=@ethernet, &(0x7f0000000040)=0x80) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x210000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r3}) getpeername(r0, &(0x7f0000000280)=@nfc_llcp, &(0x7f0000000300)=0x80) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x7, 0x0, 0x200, 0x6}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000240)={r5, 0x1, 0x4, 0x46a}, 0x10) [ 419.363110] QAT: Invalid ioctl 04:00:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xc04, 0x20000102000007) 04:00:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000300)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x0, 0x40000003]}) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x7f, 0x12, 0x1, 0x8, "46aa85b6a93ebee13a86156fbd5c6cc2122687f9fa89aef349af778add8212f35aceca7efdae515cc75025989913c29abc3d87ab0fa0f03ae02093b4001e7e23", "76dd07cd3874fb06193c78d5e3843d164cf219288b5b1c18dba922c52c4a0c04", [0x3ff, 0x2]}) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @broadcast}, 0x1}, @in6={0xa, 0x4e21, 0x9, @local, 0x101}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e24, 0x800, @local, 0x6}, @in6={0xa, 0x4e22, 0x100000000, @mcast2, 0x100000001}], 0x80) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x2c, "3c4e71202a50c722aa18be5fdc3b6f7fd7e54a8fe932c404d19db67701d4aa0696999232b9c62b1d2c8a798b"}, &(0x7f0000000380)=0x34) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000003c0)={r5, 0x101, 0x6, [0x5, 0x1000, 0x2, 0x2, 0x5, 0x40]}, &(0x7f0000000400)=0x14) 04:00:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000180)=""/223) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000300)) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[{0x6, 0x100000001}, {0x5, 0x1f}, {0x1, 0x6}, {0xfffffffffffffffa, 0xc10}, {0x3, 0x1}, {0x8001, 0x605}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:04 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf*\x00', 0x0, &(0x7f000001c000)) [ 419.470286] QAT: Invalid ioctl 04:00:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="6563728b7074667300", 0x0, &(0x7f000001c000)) 04:00:04 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs`', 0x0, &(0x7f000001c000)) 04:00:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x105401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f00000000c0)="6acb1e179323f30f3d78ee7333c7ac6eea0a49d4424cef66fa72825e00785dfe6648", 0x22) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:04 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080), 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x202, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 04:00:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecr\nptfs\x00', 0x0, &(0x7f000001c000)) 04:00:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000008c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r0 = gettid() syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="00080000ec0500006d8a2b0012fcfdffff010000b90200000001000284811f4ce10077a1907aaae6313400000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8003, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'ip6gre0\x00'}) ptrace(0x10, r0) wait4(0x0, &(0x7f0000000000), 0x20000000, &(0x7f00000003c0)) 04:00:04 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372797074667306", 0x0, &(0x7f000001c000)) 04:00:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) fchown(r0, r2, r3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x4000, 0x20000102000007) 04:00:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x2, 0x100, 0x4, 'queue1\x00', 0x63c039be}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000000)=""/20) write$UHID_INPUT2(r1, &(0x7f0000000100)={0xc, 0x8a, "e7dc095988a41c586ec256eb7391eda51173943cf8f729259504f728fc5324a2e40832b3a5d7105afbf7715f3422ee81ce4ff6ee4c3f041f0e999a7d16a1ce0519f265e997f817bdd752142db1b9b5ac9ea1e343319967417728c2a0be9be122e778b8545108af1df29b78db055dd4821dfc3c69e0f65a8d19d6c57fdc6b834c405d8e910593e4fba1db"}, 0x90) 04:00:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) signalfd4(r1, &(0x7f0000000100)={0x400000000000000}, 0x8, 0x800) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000340)={0x8, 0x1, 0x2, 0x4}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000000c0)={0x4000000c}) r5 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x5, 0x200) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x20001, 0x0) getsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000380), &(0x7f00000003c0)=0x10) fchown(r5, r6, r7) 04:00:05 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372797074667304", 0x0, &(0x7f000001c000)) 04:00:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecry\ntfs\x00', 0x0, &(0x7f000001c000)) 04:00:05 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 04:00:05 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x9, 0x80807, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000000c0)={0x7}, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecry%tfs\x00', 0x0, &(0x7f000001c000)) 04:00:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000400), 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x47, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x64}}, 0x0) 04:00:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x404, 0x20000102000007) [ 420.449236] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 420.516151] Error parsing options; rc = [-22] [ 420.570720] netlink: 51 bytes leftover after parsing attributes in process `syz-executor0'. 04:00:05 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372798b74667300", 0x0, &(0x7f000001c000)) [ 420.631953] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 04:00:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4000) 04:00:05 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) openat$cgroup_ro(r1, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) [ 420.735180] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 420.778667] netlink: 51 bytes leftover after parsing attributes in process `syz-executor0'. [ 420.833363] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 420.843992] Error parsing options; rc = [-22] 04:00:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xb, 0x5, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8001) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0xe87, 0x4, 0x1000, 'queue0\x00', 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:05 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="6563727970746673ff", 0x0, &(0x7f000001c000)) 04:00:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryp\nfs\x00', 0x0, &(0x7f000001c000)) 04:00:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast2}}, 0x1e) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574ffffffc30000000000bd6800", 0x43732e5398416f17}) close(r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000240)=""/190) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001940)={0x0, 0xffffffffba6b000a, 0x200, 0x0, 0x0, 0x40, 0xfbba}, &(0x7f0000001980)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001a00), &(0x7f0000001a40)=0x8) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x0, 0x7, 0x0, 0x800}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000200)=0x2) ioctl$void(r0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0xff, 0x5}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200101, 0x0) 04:00:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x3d00000000000000, 0x20000102000007) 04:00:06 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="8d34dfaa5482fc24ccbe834825c2bb708d977b84855c97e898c4d9ff577da7b8e19e610378", 0x25}, {&(0x7f0000000080)="ea29ce693e44cf62793f1e154492d876c0a6f845cd2cc312eb9e6b54c7f1ddd861ba4b392711cd5830ac4899669600d4b7c7308baf70235ef8410c921876e7a1237b6ce87a1154395119d4eba70a5f061cb478ff65e984944f876f1bbe0010bd038eb4a5a1d213325233d4bf0dd447f2bd08ecbb35b03ac13f4ba37a482e0d3de8c141728bd86fbcdb0693e447cefe02807f5a4da4cb1db42be2900de485d241bdd26e085a8aa653d711415ff8ca4e28cc78f8c1d397bd01572dbaa7", 0xbc}], 0x2, &(0x7f0000000200)=[{0x80, 0x118, 0x0, "a3b14c4024b1ffaf625485379322dfb296ec0aa95730d59b08a6565653a781a3cf0a2336313a3f3fea681a1f97b4d5c27750f0575231736ab87104623396ce3ae4f23fdca64e324c71648ed5bfe547e0818b39d1cc103ebdcee6419dce1a6b373bd7fad31213db43abaa008169"}, {0x1010, 0x10b, 0x5e, "d90d27c3f1bd8471c8d332c9e17defec33f83eada9d543f3379b5a9b53f53b2d7bdce00d7b553ee8fe92258f1b119811dbc2f05f56e4da6eba98b55648e74506e6118af8c3508d6ec2d45540aec424c5aa3aad168eb9e41cb7393b085825b7f92ae8604858a96571ad584350af74c083444ac0aec96a2e80f0e6a2f18e04015abb496a2a788f2b1ea799fbf5e362b645874d0c81e47466fd78998d413025915f9ddd7d79dd6ba28f225ff47bd65ac8a7580efb87ef544030a5099583fb3cd8785929ade869810d949c8fbcf1730e242278e2fa3c1c406e49cf71b1e4959349dd6fa9f07356910995a14ded4d3a421e39bc367aa63ff96c1a824e550e38a8022ff32544256ea32af1603e960eefdd127c07308bcf7cd35ce57540bc9485cca6bd56723d0d0f231562097b2e3211139c33724809a42066f4a93dc68303677ccbe34a02d4beb886902207212eb62affae75919582ae56bc919900db4b3ce2d23f91ad254b024fe0d2b8085e449a0f74da30f890d1e5dda731d58c6c58540db2027528e51dd3e11b9e0340febbeae34c0ded16f1f9a4ecb7dacf98efc70932cc23f8b813267c3dbf7afae2bf688c44b0a4ebac42a99b2e084d339c07e5c6bc932d37b0b299a1dac666818f9dd3e3abc8b5d1392dc16aeac0aec83b6f175a2fd56a3929af13e5a9bff1bb8af322b094f8e7cf1502ccd026ec7e143ff97ec3e842e9748f10ddfb490f049051b488954e23111c4f8ada1ae7e5f31b49b2700a78a74e17de3ac6590960c69cc11c8fefe1f7303593155784ee91af4f33d68b6cf0e0faded1416375db5c3eee7c4fda5e461327cb65b401e9512f62495c7e287303cd078883b959736cda2d5a6c33a52dbad1bf738aecd2f5d793d4095462fa97904aa1550dd89e4d3a1b8f2f67b2fb7465a5c3de37194573b7bc89589bf65403d12852f3ffa0e9bcf479259da4ee3076cd5691ce326629b53522dc31331dc8c0b1fca9cfd30d8b0145937afb8be057943b7d1772827061620c09475768328f61e8ad22711aa45739fa16df56613764fabde51bf2873530f85910bc6954183552d6255785ad927ca93bc97ca0743374541eb1ea41838a97cc50893fa999e63784d2269b6a46fc73439bf57a90aa06a4e3189dcac6f9d877e29978aa950d730124822ad4a0de8389ad15f827509c2123c6af0e19b6144be7a26e4877c13dd25e120749431af1a9d96f8d7c20c288f38c185016490eb80e88d547c8c0a39b29c82bf9618f15e5c7fae218ecf5dd8583950caa2c7e139e167cbfb42fc4cdf6eab563f030890de10bd7fefa48de9179caac7f02809ee489814f407886132679ef2b13480ce83ef37e68799507dbe59077b8d7348c2ca25fa5f268a876680767e33464463ef240579f43437daa0d8855231c72aef59b3962134843f1d4e57745294096c6e0ded305adb26eb8d40a9f28bca479027a1104c7562eaab289fc18a759fa31e84ce89af41c2b7293b70bcf476ccae24c87f8d59808675e034abdb600c160d3b883d7f3760dbd20a28b3334893023951d6af9eaa2aa54b09a940c664a1ae50c099883a8c6f14730b272d9c875c568ac35186692a5cbc3c15580986975f8fe05c09f2d27497f6892360d6482bf2a18a9222a96222b3c4ce873c73b29b311ef86eca40a4f54018b581bf21e411cd049fc7618fceec2e2f5292d5d923b10a23daf4c0909219de3f5bb1ba6e0805a1e1ce5e5077f722bc674400c69112f488b0e4821d6e2397afdf22d8438a6cfb962579a0a0a1d295a9d13fbff0702a87eaa26ee9b00e99ada4cd03dbd17728966759f0ded57af10392e62e79095063ebcf07d5576ac4ae5115258733d2c8487f9feed35ae00be6b0a557e387cda0e7301d7ceb2906ff81279ef416174e3a01fed64bb1db9d3755e29a60517305ff4884cbe82f9ba74efa67d1f54907916348099be6f03bdf3d906325ebd97baf21c72aeac4a3bd3d182ac8e180f5fb6cf11426f19dc17a28a6626ffc062020be0a271f5c04e9bd3f7ca75a6b5e962e09a18d84ad7d79e94055a1f9a3ba4f9a192b35b147be25046ba32ed989b5282a64e201b2f9dbb8dc69518c22f26b93c83db497ba9224a1646741d643a25a88d2c024796b3de97b9759fe9804ff7bca65d49069cba6fc648ca9318fe35329c0e44de987c722a29296f3ae5731c298c49c3d03eeb799188e71ad596a38fa2a8f8ef6b7b97b575c8b1e2a24ea98a03bb01eaa634ec6b2e633474a140160a4e98fce2896363971e4a7ca82ba95b26c13333355a5be5482efb82fe97a77b0cdb15beec3bfe1c45f0388574cc79b6fdabc90619752fdbd993f0584fa68ecd225ed0514ec5c164df798f97c2cba61ab5f57613a974861104d0ed949b797edc33bde1058d3e152ba219556b05cde26d20fb6684f6ed0062f32fe3e13717ad2110e16c566c7a5b29217d271868ac4cd8b95c5da8033eb895132ea27b2cf3bd614298b9ef49e85e09a5c2cc6c40dd9748a0860e1b55682bfba7a264845e80ef3e81db50d8997b8a226d036c3d60c781dae12a5bc96bd71aa91eb0da7533785c825611e4a8f0a351980996766def9948c16903e2b462009bc322c4bde988c4dcc9a77d313f399175ed4fc3c86d3f91ca9bb31e4a9803e532e20ebd0ce57d92c683a7f6fff04aa7e3c15be83ce8d9ada8e0aa6fc3a553f379bb0dc246ae31beb18a09551f06339efd28dac7c99f580e119923a1964d2c5c39c33bae2c1f07bbdd1f0af657ebf649937476c0eda66711d8a78239d4116481c762ea241310e0f4745f8c748bdf9b2a6d9a216233a0d5111ee07fce79274889ec0ad56bb8fbe9eb59dbf1c8bb1478148028afef454506921abc21a49ac4d0eb5a54c9f45d9f640b523efe8ae9efb66d4075d27f41f889b89f897a25d4f16b4dd69f9e5054b2f793b51a7633ad01188bf24946d93da00b4b3a8ba80f4d6884391ffabb54acbde20cfd82e712900fb6a9974ea1ba7d338971442bc064238e883f2d305d150c9301579000cd502c8f769c61a50c37e77b206205e3ac343fc2c188925d53e4d056be705037835267b211cf8b2e30d574295180683c8ec5560aad688b69573efc3e4099241ce7bc9e79d68fc0d0e1852ad44bb01603e13e2a8c45512fdca27142eb3e0e8ce48397f8c14d639e0c5322aa88dc5aab710b557ba555ca06472d12ba834663de413f501fc7ed0aedcc8365027ac68f060ed168dc6488fe2684f89c84e0be846e4e7a02aa2703e517fc6d1f60626d46787239640fdfdcb6d033a5b560791037daaf6be77c416bc676f71cc568bc5f446c6e76d3dbb03fd0210577e8556a94c8ac7c2462ff9750e243c4bc87c1ed9b7a559e08f52de577e1a43ff1053edbb378afc607113dbd0913629b34ca526d5a8331712b2819986690458055e7ad1af47ce45cf491dc306612219cf3ca52bff00632b93b6507c9b3ad92adf3eebffced2d4910b9bf04909b2355da2d1fac3bd00b34d83a3254a15e0871ce8eee6ba8671233befae02e743429138bc4df5a1c99e7ef3653463d4cb4c61faccf9ad1dc468ee4b4c72b5caf4353f3e10ff7b1139157fc02e2d59d4b2426cd287aaf850936a4ae10052853d2ae1c729c45e643ecf1962cf1884f140ea9ca48012081304156e1a604e7c444aa0a4a50f296d856368a2e18597ee40ec5ca58d04c63d4c151a7b8205d3732e753c5c0f8d0f5bd2d5cfcaf85ce21be26cf83aa360cb91a2725f8eeb95329f2e4e353b75777be33fec89452022aecdc02a80ae0b201eb887d4a010f9da7a5d82a322358da8b5a9288b9652f088d6c42f96069860ddcf09f8735ccee8919cbcc74bd734afc33687122486e32590a74dd4e8dd0c953b3f03ab2ad92600b012867c1cb3dbfae7e06766a8b0a6df5dff23aa3f0fcc78666709436198ce91f7389baf84f1b3ff54f8144c3225cafca73791e350917cebc4a1f0b35f1acb573e4be814e74dbe5f7afaea484d0b94ca88f4e2fb59824def8150e87d282fb7e7aaf898010617247d69b23cb090c9b0152b15a626a997411917e04515c9c99686f57a99dacfbcfb82453b1654f87e1adc7f2c513977052ec45f06d7a9eece06bfeffd1cbe629b59aa6a42c197c956c7161f2b839d2c19a24ebfd2c1fac0fff6f026e11681d6d6e81d8cec65444dc8f6d7e147a81896902455e5274affd1c8112ac2cf06cda4a43ad4bca64b18d23b0218d920ff9b2eb9f1889ee39a74cd5c11ef8601bb19a58a03364877e43a70d30c4d1362942ff275b833f0365b3905e08efc9ea70ce6a09031d647930c2542620bfa35ad89084acfdadede83e4140b050a5bf83337eaed02c6da9ea6acb4605fce08eae161322ad7d4db4859d194cebe3ec0aa2707da3eac13769bcf469a36b69ebb5cef6c7ccc42891f4a635f5a7509b7fb619ddb611adec68f3a075b564eef4966b522d47e9d1219de19e03366e852b90becc1a18e6458cc4888ad7b16690830d5d864ee5da8ff4fd9bc7255c5ad376127548b7fce3dd0beb1681d68255363d18c880521f2de8c63ecd3ba387a6ec95afcab64662d44e2afa15540fa10cf9cc07e1cdea163b5df579ba04e48cd785116975b684f4dd05a3f78f4821386fe128c348e53c1d5aa5385334500ffb8da91dce6b760f5374237f350e9a96ee6df68d107d362c6a2fd49010fa5419b8f82014a9d96f264d4ef7f6f9e156596189afe2a9b03361810c7f9a7f2099241c79d96608e1b616d7de606c2bcbbafc08a55758d8ccfddd136ea0b1479dd9512b823055885e3e88ef16e7041de175eaf81803ff65f2303812bf287ca9b212acaba710a3677a29d37cbbc5b7194d8f42870728d1d3200dfbd0b10a2384d99712a933610ffdbce6065e474cd7cb98bf922f69f5d5c9c4d0ab219558ee9c691bd3321fef9fad6f721eff1afda0ea927ea0f20f879a5ca190caddd2273a70eb83ceae8dec65ca06b299d040f1f89c1ee61d602144f7725c2df056b578298ff4bc68ce476f502a31594d5a8bc8261022fba454d81c169ce2e6f798bd7668de88824a930bee093a3c6da207b57281dbda5e06a6dba841a23be869d839ed0f80e81bfda6364bcddb09cbe5fbd9acb3fe079fdccb2aaa9d373e0bf816ff39e3ac2e316e8c66ad4622c33dcb471d71be15c1cd9ca551a2f0f8e337cf0d9b1395f10620b72aa968a9bee925afe6e3ec9626931cdef3b0a3f13216913df62938126b9feba88f73ea14dc76908b9fba72418d40ce00b5149d4cc4ccb2add3236fdecb71ceb5397f04758ce3a186bdcf82c0e13ddfd1372013850bff9db907d03c9a828895b50f773b175928bca8b1225febc3fac234343e11f9c2505598746035ee93634443773497566dbb1329d333c0634010cb3fbe05848719aa84787b425207f34cc5834a406dcce1522848cce7e8717e329824568dd7f6ea072784de64abec3bdfbeebde2cec11b659bfdc47dedde49fc909536c885f0f15c046e940a11200e84f169a6a75477809ae4e5e6c397f6ff246c420dc83f4bdc458efa8fb1cad81b86ada8594c6664bc9680a841d04910d7647608141da8c1159f24aa7bb667d6cb6bfb83957cc16acd2e82c681b579663de269bf34ee6ccc3e1d953a4fa3f6cbadf6692f983e66926aa0354a2c4ba288dbf415bc6cd3d7f6a67bc1bb446e54c2c73f4e98a7848c47b0034d31975cc8755e711cb1dbd37490e3867248c59bb46e3c55a0c6b68964d0fb6a957b4dfc137008753f673ac6c09611b3d6635bf2b225dcd5ce4fd5eaea532f78bc8"}, {0xe8, 0x105, 0x10000, "dbc96d711d051bf421585c010046b243f2a1fc9ca1f8c5cf5c470a22fc1f0c22235f6de4491592bf086cd95b32d89adbd889416e0ea07508c72322e4f36b72878be35befa6e61ce3a25df77591582bca8c2efa31fbf65d6d9d885b177180603c080887b1d1e3be0a1412f5914507b78ca7671a25d84681681a7c73559c8464016a4eeadde04267553a42921095275afb2dee861ea59ac16bfe827bac03384b25d66209e1d2613dd84f1a94dff8866f35e63d538d6c0297337b72c090d2dc3b1c39f6919171c943addff3f4d2ba5b91a84c26"}], 0x1178, 0x10}, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:06 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) prctl$setptracer(0x59616d61, r2) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 04:00:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryp%fs\x00', 0x0, &(0x7f000001c000)) [ 421.269234] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 421.324532] Error parsing options; rc = [-22] 04:00:06 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1200000000000000, 0x20000102000007) 04:00:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, 0xffffffffffffffff, 0xe000, 0x0) 04:00:06 executing program 0: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) openat$cgroup_ro(r1, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:06 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffff7f, 0x161201) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000200)="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") close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000080)="8efe8a231fc8edb297fd42fdfedae39300e4ce5b9eb542ed95c5325009ec61e6ef4887e60b40bf6076f957c3c8fe3709a75c457016e5bb00e5722c153508160210c478e8898e36a957ac2d66bb71a5960366c494f81feb0c527bd38be3c4609362b989279df64f08d93f11ed3f3aab9f5bb8e287d6f71f7c9299634169ebb60fcf40177313c0496c98eff6a304791e26b024cb3e87bd25fa4ea7600deae4e61a4c4bf2705732a9c72c2bc8f23b2e65981643c655079b57d5cde84eb40e150b97") [ 421.502716] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="65637279708b667300", 0x0, &(0x7f000001c000)) [ 421.564654] Error parsing options; rc = [-22] 04:00:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x6, 0xff9a, 0x0, 0x9}, {0x7fff, 0x7, 0x5, 0x9}]}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:06 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x9) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x1, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x1100000000000000, @empty=0x1f4, [0x4000000]}, 0x6) 04:00:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1200, 0x20000102000007) 04:00:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt.s\x00', 0x0, &(0x7f000001c000)) [ 421.813712] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200080240, 0x0) [ 421.883381] Error parsing options; rc = [-22] 04:00:06 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2000000000000005, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xbc, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb4b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x17}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x401}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x440}]}, 0xbc}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 04:00:07 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x4000000000001) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000200)=0x1, 0x2) r1 = socket$inet6(0xa, 0x2, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x2000000000040031, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)}}, 0x20) fstat(r0, &(0x7f0000000180)) fdatasync(r1) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000000c0)={0x8000000000000000, 0x6000, 0xffffffffffffffff, 0x2, 0x1}) fcntl$setpipe(r0, 0x407, 0x0) ioctl$int_in(r0, 0x8000008010500c, &(0x7f0000000000)) 04:00:07 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372797074667305", 0x0, &(0x7f000001c000)) 04:00:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt/s\x00', 0x0, &(0x7f000001c000)) 04:00:07 executing program 1: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xff0f, 0x20000102000007) 04:00:07 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) 04:00:07 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="6563727970748b7300", 0x0, &(0x7f000001c000)) 04:00:07 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x2000000, &(0x7f0000000100)}, &(0x7f0000000000), &(0x7f0000000040)=""/44, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)}) socket$inet6_tcp(0xa, 0x1, 0x0) 04:00:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) getpeername(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000040)=0x80) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) accept4(r0, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80, 0x800) [ 422.455536] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 422.494729] Error parsing options; rc = [-22] 04:00:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf0ff, 0x20000102000007) 04:00:07 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfsz', 0x0, &(0x7f000001c000)) 04:00:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000140), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x1000000003, 0x2}) recvmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000005a00)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x40, 0x2) 04:00:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt\ns\x00', 0x0, &(0x7f000001c000)) 04:00:07 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/\'roup.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 04:00:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2200, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getgroups(0x3, &(0x7f0000000200)=[0xffffffffffffffff, 0x0, 0x0]) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r4 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) r9 = geteuid() r10 = getegid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RWALK(r0, &(0x7f0000000e80)={0x30, 0x6f, 0x2, {0x3, [{0x40, 0x2, 0x4}, {0x22, 0x2}, {0x0, 0x1, 0x2}]}}, 0x30) r13 = geteuid() getgroups(0x4, &(0x7f0000000700)=[0xffffffffffffffff, 0xee01, 0x0, 0x0]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000ec0)=0x7fff) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000900)={0x558, 0xffffffffffffffda, 0x2, [{{0x4, 0x0, 0x3, 0x3, 0xad, 0x8, {0x0, 0x10001, 0x2f, 0x3, 0xb, 0xfec, 0x32f, 0xc91, 0x3, 0x3, 0x4, r1, r2, 0x9, 0x9}}, {0x5, 0xffffffffffffff80, 0x1d, 0x80000001, 'vmnet0keyring$\'{system.#,ppp1'}}, {{0x2, 0x1, 0x80000000, 0xffffffffffffffff, 0x5, 0x8, {0x0, 0x9, 0x0, 0x80000001, 0x75, 0x3, 0xfff, 0xcb, 0x4, 0x2, 0x0, r3, r4, 0x6, 0x8c70}}, {0x2, 0x0, 0xe, 0x6, '/dev/snapshot\x00'}}, {{0x5, 0x0, 0xfffffffffffffffa, 0x3f4000000000, 0x8001, 0x3, {0x1, 0x5, 0x5244, 0x4, 0x3, 0x4, 0x2, 0x80000000, 0x7, 0x5, 0x5, r5, r6, 0xdd, 0x6}}, {0x2, 0x4, 0xe, 0x2, '/dev/snapshot\x00'}}, {{0x0, 0x2, 0x5c4d, 0x9, 0x3, 0x2c68, {0x0, 0x0, 0x61bc, 0x2b35, 0x4, 0x0, 0x4487c6dd, 0xffffffffffffff78, 0x7, 0x6, 0xfffffffffffffffa, r7, r8, 0x1, 0x8}}, {0x1, 0xfff, 0xe, 0xf6d1, '/dev/snapshot\x00'}}, {{0x1, 0x1, 0x5, 0x4000, 0xffffffff, 0xfffffffffffffffb, {0x3, 0x0, 0x7, 0x4, 0x2, 0x7, 0x4, 0x94f, 0xff, 0x5, 0xf, r9, r10, 0x8, 0xfb}}, {0x1, 0x7ff, 0xe, 0x6, '/dev/snapshot\x00'}}, {{0x2, 0x2, 0x5ba, 0x8, 0x101, 0x4, {0x4, 0x9, 0xffffffff, 0x800000, 0x10000, 0x9, 0x8001, 0x10001, 0x2, 0xffffffffffff1913, 0x8, r11, r12, 0x88a}}, {0x2, 0x4, 0x0, 0x3}}, {{0x1, 0x2, 0x9, 0x3, 0xfffffffffffffff8, 0x48000, {0x6, 0x1, 0x9, 0x7ff, 0x1, 0x3, 0x0, 0x2, 0xff, 0x5, 0x2, r13, r14, 0x101, 0x8000}}, {0x3, 0xd5, 0x1f, 0x6af1, '[}usernodevselfcgroup^^vmnet0[)'}}, {{0x5, 0x1, 0x79, 0x1, 0x7fff, 0x9, {0x6, 0x0, 0x7, 0x7fff, 0x200, 0x1ff, 0x9, 0x8000, 0x0, 0x8, 0x7, r15, r16, 0x1, 0x5}}, {0x2, 0xb8, 0x1, 0xcf, '#'}}]}, 0x558) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) shutdown(r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000180)={0x4, 0x7fffffff, 0x1}) sendto$inet(r0, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000000000)=[{{&(0x7f00000000c0)=@rc, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)=""/29, 0x1d}}], 0x1, 0x0, &(0x7f0000004680)) 04:00:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecrypt%s\x00', 0x0, &(0x7f000001c000)) 04:00:07 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x8002) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x2, 0x20000102000007) 04:00:08 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000005, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005200)=[{{&(0x7f0000002700)=@can, 0x80, &(0x7f0000004b80)=[{&(0x7f0000002780)=""/152, 0x98}, {&(0x7f0000002840)=""/49, 0x31}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/34, 0x22}, {&(0x7f00000048c0)=""/150, 0x96}, {&(0x7f0000004980)=""/21, 0x15}], 0x7, &(0x7f0000004c40)=""/65, 0x41}}], 0x1, 0x0, &(0x7f0000005440)) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x1f) r3 = dup2(r2, r2) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x12b, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 423.076339] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:08 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rpc\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0x28, 0x3f, 0x3, 'queue0\x00', 0x3}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000080)=0x10, 0x4) getcwd(&(0x7f0000000200)=""/172, 0xac) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 04:00:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf0\x00', 0x0, &(0x7f000001c000)) [ 423.189453] Error parsing options; rc = [-22] 04:00:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rds(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1a8) flock(r0, 0x8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x40100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x10}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000180)={r2, 0x5}, 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:08 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x1600000000000000, 0x20000102000007) [ 423.463397] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.544261] Error parsing options; rc = [-22] 04:00:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) fcntl$getflags(r1, 0x40a) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000040)="c61d4225d84f8a8107267317fa7221e49d57ada941") 04:00:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372797074668b00", 0x0, &(0x7f000001c000)) [ 423.568085] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.669270] Error parsing options; rc = [-22] 04:00:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x500000000000000, 0x20000102000007) 04:00:08 executing program 4: syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x81, 0x1) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000080)=0xffff) 04:00:08 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfu\x00', 0x0, &(0x7f000001c000)) [ 423.935109] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.951676] Error parsing options; rc = [-22] 04:00:09 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) write$P9_RLERROR(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f0000000701a91347ef0138121500"], 0xf) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0xe7, 0x0, 0x1, 0x7ff}) read(0xffffffffffffffff, &(0x7f0000000180)=""/241, 0xf1) fsync(0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(r1, &(0x7f00000002c0)='cpu.weight\x00', 0x2, 0x0) mq_timedreceive(r1, &(0x7f0000000080)=""/14, 0xe, 0xff, 0x0) fsync(r0) clock_settime(0x6, &(0x7f0000000280)={0x0, 0x1c9c380}) dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:00:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80240, 0x0) 04:00:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xffffffff00000000, 0x20000102000007) 04:00:09 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x40}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r3, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) 04:00:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf+\x00', 0x0, &(0x7f000001c000)) 04:00:09 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) [ 424.085479] audit: type=1804 audit(1539662409.060:76): pid=17946 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir636744980/syzkaller.DBfXbw/438/bus" dev="sda1" ino=16570 res=1 04:00:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readahead(r0, 0x80000001, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800000480, 0x0) 04:00:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x100000, 0x20000102000007) [ 424.213450] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 424.255052] Error parsing options; rc = [-22] 04:00:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a0000000000000001396ecbc1e5610c58749450", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x17000000, 0x20000102000007) 04:00:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xfffffffffffffffe, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x84640, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x7ff, 0x4, 0x80000000, 0x3}, {0x3ff, 0x5, 0x5ef3, 0x4}, {0x4c1, 0x9, 0x1, 0x22b47376}, {0x8, 0x10001, 0x518, 0xffff}]}, 0x10) write$vnet(r2, &(0x7f0000000240)={0x1, {&(0x7f00000001c0)=""/37, 0x25, &(0x7f0000000200)=""/57, 0x1, 0x4}}, 0x68) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000002c0)={0x1, "b0"}, 0x2) 04:00:09 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf-\x00', 0x0, &(0x7f000001c000)) [ 424.485021] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 424.534390] Error parsing options; rc = [-22] [ 425.008110] audit: type=1804 audit(1539662409.980:77): pid=17965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir636744980/syzkaller.DBfXbw/438/bus" dev="sda1" ino=16570 res=1 04:00:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x401, 0x1, 0x9, 0x12, 0x3, 0x3, 0x9, 0x142, 0x38, 0x2e6, 0x3, 0x3, 0x20, 0x1, 0x800, 0x0, 0x7fffffff}, [{0x7, 0x8, 0x3, 0x84ce, 0x9, 0x7fffffff, 0x96ea, 0xae7}, {0x60000007, 0xe8, 0x0, 0x2, 0x9, 0x0, 0x3, 0x37}], "c7445ebe3da066626e32f9742aa87c5eb4d79dda1205da0604a334665667b80e095f2bc201bb736c299c32c88b59baab1f14df50f9520d35c57517bdd85a848f72ab90c2840d7bc88505ba6fdf2b025fd3f68e22c6def562cde5bfd79aece53f003e9afb3cc9c07c61f0d782fa95529ad5f9c1940aa08456ae2c4c0a2947b08ac48cacab36785200d620b1fde02d0b31635d6c9109ce017b28306469c04cc5e427b9e82b37a43123514ae84d6504a478895f4602bc205d01eab3a1e45cefcf0343d8980a38aafabe692364d6f46450e7ee0e006dd8e72a126483035c5aaa1732a29a2863f21108c18db34806d1ce84b82acbbd1fc536e782da4549df8dd6b723f7cd4da48ec272017937a78058eb0bc8c861813ed25afecdf3f9afd783e5a276f20ab476efa6158751de7a80fb624b50ab44716d9176c69be06a37c64145ef587f35775ddb2686ab87a4b08326e5a088aecb729b7861363458656a130cf1d2d713cddb4a259f1df11b85e5bc25bf7de1791f795fa19319a896c59c73ac2af5e7c3c258da4dfc50325029dfcd3f2e3754f413f9bfb4dd19bb6397559bdec4679307a9b83406137a05939b56de34fa38a8251d704ae8acdaa4dbcedf95a5d4ed8366a4bce2316fe1158cca54d78a9853620b65eb4f410ac43e7151ca081695454c656b6977792f89119ce734a10c14cf57ff6917e5ad0be41925db579dbe56cbcd1e62ec4469cebed7ffcd7ae363ac6c193f67b2f3bfc617717d89443c8a5d48bc64aae004a6890fff45f4dfaea98e4ceea64c281a2a696964a71c2bfa0d16b11629dbd6599d0b0ef395a3cbb48e497a039cf6a13c821fcc280ca6ab1831f1d668cc0d8ab03cdfc3a56652d994bc885086afb1a7ee4f00a6229550eb3b24decd8640a4e27b1a14004244c98e27cd66d514fba213522c5a3116a768e6b828c4bea90085d67dcd30a69ec01d0635c7e1243b8a96cc7f12fb7548eb5372f0ca193a38e6c018ac13a9293c94b350d92bf86ec27c2739c782b6c58f42d8d57d1e3a2318efb81122c8940a9a5e224faa3622c7a9aad1fc72457babb2410050f4eed1f9f610e7954e8adf2f36630d29bda263ce542d6464a964c7cfa88aa0b1d7d332afaff1d871ea9dba858095e25f38a1da4536ca6417b9ecd19c738248513a59c0c1ef88cfaf1b2c322af617f023fcc991cedce1e6fa9b8f848de938df82588a456d71d0e99b2ffef5214660b32603033dba9fca4e4b5d0a3badb79e16295d795eff4291632897946587f7000fd1e69d6f2e79cbb11173f1e1b0e0ad7c8fd06dbcbf544a7300ee78b206b8ba57eb0d9dc94c6c7573204fde0465fe042b3113279ab8380866e0f21f30ed90ced11098b047fab358601fba402d51c0013127fd0320e03184d50287c3d3e816b821a615ac568e172ce877c5ffe14f6e32b4be2d6f9eb5cf5362060385c0803e4d98de85ef26791e1481327dfb64840a0442a2cf928fe634f9e947961846dc5c73de783c6f2795ba15dd27b3f462f8f7d25feb76cee726aba134db91e976e2385ab7e95d4e2817c0589fb45d26114b4fd26f8ee252945fec3ecd2b64694d5b8db6b2c2e604f65eadd882dd5bf615669fcfa4f0b1614cf91e49ab53f1e61a3af2ac7dc5d2ecc64da68fb97d5300fec92f132b0adefd4f855754a10aae7fffd4458478311d1ae7bf5c4bebaf820d45db125e66701dff7432197900235d2ea2a9cc51ddbfed9c772067eab05430f2c55282e1b90c34767ece3a573adb3acf406f96898f58f464d834dbd497272ee2f4e9907e9fdaced96a008f9c026645f6a57f0f8c39ea860e93d940651fe218fefb086c92c089a99e295e60df2d2e452724a019bd551bcdc70052635c33b0c94cddd51f34485b9776923f847226ffef47fffd5719210922989690d07d9ea7210c94282438abacd72e471f28a8edee3e3c5647af5dfc2d304521e98c51a3778f2c39f5e52e68899518b4a650854a6d7b157c96fc812fdd918ba682c48361643fc3838dbd3afdb81e93adb5d5753ed5aa852bf5e11f3728d36fcb2b673e4e3d99320de90d2406d1bb6387588f46e61bad772f8c3bc68569745ab914fc67c45d2e98db5a47e27a3b394c9bbab1ca1347e99679bc5392b2a0aaa3a5f799ec68aecd1c7f201d12185fc5b0232d7f4ed4869fe0e8ada4e86aac789726d67502bd51454a5ba4843abd4c1120c7cbe2a646110148eb8cd63da2583af098dcb7c1fee86e7279e4a24ae5531feea732d7385eba749d35f48d40db5d07ed05a96b6deaecffd1966d2f0bd84f79c04e65e43383a12de18dd376bd17309bfea86634a9da6be9a3c1604cf100cbbfc02c56e375983a8fd6099668c4a6a4f9bcae6fbb2dadfd62dd0d73685c6ca6ab79b25124f85ef34db6a5bbe874245a0646ab6e0e742a9cfcbbd17bc851ad197b68ceb76a3569b3a7e78e9a9fc0e7edd6b2c2343112234112c2dece5ce0b736cbc054d85ea7bab64448d2cd06c5a74d27ff9942496b486648e75fa8d07e9c909dfa29fd4b3bf7162dcdf1c5a595443679ad707f786afe5794e5bcfb0b0a5988abedc93f5075261b7fe7f427f561faabe888402eb692fa7604c69b6e6d904ad6cfb8bfd333f29d39b8aee20f6e32a2d9b7f82383076f608c9c6987c6732c1ba93772ed94466ed330e3a451a6fa68f55e5d0c9a8eca03169ca028eaf9653647c0cfc55d084562d820920d44da1ea10dce93c01390b3172662866dab28cbb1203d1a8bfc32e2e22d9c4462da658d8a658e3e410983cec29f80ffe2decaf49421fc884e66d316fc6269d9520380d8c47fde5f9c525b090eacf9dfe0dd73c8084a7d058a5812ba7c809e568e59db4f8bbd49c17143185bc00cfa7ac7d69008037dc5e1d5b56fb88841f2eb73dc41c808a770006926903b9a7991493ab6fee9ac67ff9a0106ffc55f85abcfc371f7c29174cde36501c6a715d254b35b413c0a709d34f88443f2f9c9dae30c7d83ee002031f57a74b059c09ca06a5537cfff228792688adb26a2d2dcf5ff6d85162baeddd993415d48639604c0187b3e49d5e0b7b5077e24d87c35111517e48cb4c137078e81b168a114ca444a46920cf2e72403f42dbc3bf3eac811d19bffbc613968a60f282b203568a0cdce2c6ddbcf0a7065d9df4f8ca7edb75164cc618db554870bc5bcfa31b49a7df1674c0d9ab34f72d8903e9f8bf335d1a1483bcfe87746386fad443ab3fa14406779e27c6402c137bc3269c274c36711bab35ab01f82bf052c5d840c8c43c4e4e2243daebdeea493752122d8cf2191c5a54e2078d7d456bfd1993db25c363812e9a0986eae91cdd779c83f8e373d5f6e62cb179d86284801b1bec43492c68d5e412f22cb6c26546d9cb1cfefa371fc95b7b2ce3746fd749566bd0c16fa5b9e0dd03389e52a812236086684800b9d99d8bd203f006f663e37db639d90bf538e0f308819de80fa215181de5d3a713cd506677d02f5751b6119c7ddac25e0bffa59289e6e048682d4668350479a18b47cd774feb1d1be81c97266c437ebe91b71f1cded04f54c871b8bcecc94825739f9fc5511fa5a5174d1f07fa724ffb21ca64df803cfa97b1042f758acc8d036e6ddf76d04be4456c98f4c9d4b70aaccf7922ab13ab23c8ee976532629e6d2725f5ac0464bfd8fb13dc769125480bf2a2a2a9f719f2e01554b9d5e0a4e9ec80b6ef0b49387f726c789e15994c28ab1d150981f7a5c45de7316314b7f779f99e9017e159f341b95a8aeee5c140db1381633ac970e48fc08ed45e620fc66570d1cfa20fd927b024c562143b4aad549e981d145aeab11d39b42ab70aed40f5c22d3b24d58e9149597626efb42837758d2eacafc71a7d1d33ac4743ee8ac3067874b8291d64f280cf41ab231b23f1792a4e37b4b81978c79f01a946281276d425cc466518306e4d291a90dbe221a507efd246c033e469ba4064c3999d5e5ac635ff29ce5b81e93038b0ab479e80780d8e8059f86aac599729a14603af5267c9afd51baaee48e7e9c3ff2e3718219e32417860ddc4c289359974200b0a0f951f30cb260fccbe8ad6e16789c830c0c4e8852c320ae582e76035b2989c09d8bfd85fe75396252d2d40d6561331b5ea904832bddade5613adce3d8844d41647e37e5815aa7f952e52fc1d4dd4305b8b93919b444540d0a9e2aeab1de23f8bd7cea638027e140a779c2af5ac48aad216d9843eee960108e870bdf01bdb6dc98f35267fb43e660b42475091a37390aa5a6b84761e2ea8f610ad90d36753de83918c4979d427c5408a1d78de85759cb3de5c5fe02b05375810b20c3538ccb5f4001788af039f9736bbb49901922ad5360b291d2431fedf60e568d97890edf1afd384e1af19c8276faa9776b311bded3a1b95e688419c3ab7bd19373e8c70d6e404fae657b518009315d22edaa0c14f12f471e50a52959adf4cfb756e927ba94dcb9d41ebf38a0171c5cecbb5a25b9d55de9fba851f50763138d85119c4fd786428790d6f68b376e2cad386c94164bb653b8fff610ab84476bf1133117207aa20f06580224223509a0919551b13abf7d8d80069c35d1c001ba04bfa12370f5d62c990c322df06876afc3a3a188b0ac13f0a5a48b7d2ff07d6efd217ef65f1e5a060bfec6635b03e822dd0d256457b9f1930f61ae196f882a001a7572cf93c7089f4d41e7d1b4fdab5f96a0b725c1870de2b7594a75ba366b1a3d8f83558e6096ff9119181ec6b0c346376381b23c3f915a14caf3fe6ce7040d87226885c57d60fb0ffcbb2cea6a47b260a4251cf685308990ceab89e855be50cd022939e4a5e9d6dcab7d43420e11cc87d243619ea0a39b5c91bc245fbf4bdcb6ce86d0bb60aefcda84f9fa0ca4ebf2912ac5037fc15aa025aba75d03678396c006d0ae94c7ebb0a5ac0ca971a8503018602aa9b3a487ae5d8faac544d18d371695f17a3afb5c088b0504116e3313d48e112502568c5380301d370fdbd6c9b18ba67b25d5f11191278b26e5252942639ebef55b3a65d6134024b20ab8680d864dc7be038850766d7e73e2d5fbaf2fa4c3c9cf365a40e975389130d032c48c326b75a275dc9d1f00351e558d5c1aea909046a9ba8e98053cb7d87bfb085612ce1f4499f7f02579aa1eac68367ac1f0a6e5140abfdf90bb46c00dff6b8060ec52d324f7b1e855c531011abee4835bc07a995e1b4ce737069c67aeee9c30381c675a1f5c5240b99edbe9778259a7d6b9f45421ffa2ae8e01685a420812beb720bd8605128c11ee01aa4e8a27f9dd0d99e1b9adb1ddc386f632cef65135021f9c1fe86e495164478040837c4fe2655bede924d1ef1633105845043457fa19d247a05aa0ad75daddcfdb100713c247490376eaf73b92718b45c9901e9bd16a6d943376cfd515d6dd74dd6c4249d53fc1099f1c9f79f8c205def7741aa8b495fc69336464ec402c306d82816abe2139a97450d50cfd5221ef8ec5a5c19c847dda89e7b10e3c09d9e99f113a7e3cd7fef178efdb44a9f1b0e1b8880bccc6d7bea5c20a1c57e49e87e72f0888a8dfb3692bbf82f38a49b939f6387d8b4b90791aee76fd091db3aaad7d3697b680ccb54df47e53cbdcd29891d213b3a6dd76ef41abe44116bda7c41f0f891064166ff37d066a8162ab22091242779178f9140f4e9c5e67e3e2e79582ad5cd3dd4c39934314eb24f22ccfe8f207e2ddd23fa0afa2b038a4b8aaa1ab76e20c33c9fd2f639f04c5d9ca1fa32d36357df486b864172acbdfc37dbaa6cf595d3cea759cc80c7aba9dac", [[], [], [], []]}, 0x1478) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000040)='tunl0\x00', 0x5}) socket$unix(0x1, 0x3, 0x0) 04:00:10 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x48000, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 04:00:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfff0, 0x20000102000007) 04:00:10 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:10 executing program 0: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)={[{0x2f, 'cpu'}, {0x0, 'io'}, {0x2b, 'io'}, {0x2f, 'memory'}]}, 0x15) r0 = socket$alg(0x26, 0x5, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/bnep\x00') bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r3, 0x3}}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000640)=""/48, 0x30}, {&(0x7f0000000680)=""/105, 0x69}, {&(0x7f0000000700)=""/4, 0x4}, {&(0x7f0000000800)}], 0x4, &(0x7f0000000ac0)=""/221, 0xdd, 0xff}}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000e80)=""/17, 0x11}, {&(0x7f00000013c0)=""/157, 0x9d}, {&(0x7f0000001640)=""/219, 0xdb}], 0x3, &(0x7f0000001940)=""/185, 0xb9, 0x7fffffff}, 0x9}], 0x2, 0x0, &(0x7f0000001000)={0x77359400}) fsetxattr(r2, &(0x7f00000000c0)=@random={'security.', 'vboxnet1\x00'}, &(0x7f0000000100)='net/bnep\x00', 0x9, 0x3) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f00000005c0)={0x800, 0x100000000}) r4 = accept$alg(r0, 0x0, 0x0) getpid() sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x6440040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="00000000fa7f12cc3766d66b421e73ac6b35d13938aec2a76c5d15d57551813ec79acace83c100e4f1230ff1bee8c035a8a323d12fcb6d37d7b821495bea895ed67bd45be57e42bd2776078a77986937d27c2a2ac5fbdd34f39f2ace073d25228b620130c0a25ee5d4bdac60fc87737efb33f3156c674b50e6", @ANYRES16=0x0, @ANYBLOB="000407bd7000fddbdf25040000004800010008000900010000000800050003000000080004004e23000008000800010001000800050000000000080002002f00000014000300ffffffff00000000000000000000020008000400ffffff7f0c000100080001000a000000"], 0x70}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000340)={0x1, {}, 0xd6}) 04:00:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf.\x00', 0x0, &(0x7f000001c000)) [ 425.122771] audit: type=1804 audit(1539662410.090:78): pid=17969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir636744980/syzkaller.DBfXbw/438/bus" dev="sda1" ino=16570 res=1 [ 425.199443] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x101100, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x58) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) [ 425.288276] Error parsing options; rc = [-22] 04:00:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfX\x00', 0x0, &(0x7f000001c000)) 04:00:10 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xc040000, 0x20000102000007) 04:00:10 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x101402) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000040)={{0x1, @local, 0x4e24, 0x0, 'wlc\x00', 0x2, 0x1, 0x6a}, {@multicast2, 0x4e20, 0x4, 0x2, 0xffa8, 0x8}}, 0x44) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x3b9}], 0x2a, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) 04:00:10 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200800, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) close(r3) r4 = semget$private(0x0, 0x3, 0x4ac) semctl$IPC_RMID(r4, 0x0, 0x0) [ 425.482088] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040)='/dev/snapshot\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000100)={0x3f, 0x10, [0x1, 0x9a2, 0x100000001, 0x1]}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80240, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000001c0)={{0x872, 0x1000005}, 'port1\x00', 0x4, 0x80804, 0xffff, 0x400, 0x5, 0x1ff, 0xfffffffffffff8c2, 0x0, 0x4, 0x100000001}) 04:00:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf%\x00', 0x0, &(0x7f000001c000)) [ 425.598960] Error parsing options; rc = [-22] 04:00:10 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)="656372797074667303", 0x0, &(0x7f000001c000)) 04:00:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xfeffffff00000000, 0x20000102000007) 04:00:10 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xff, {}, 0x0, 0x2}, 0xe) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) 04:00:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfp\x00', 0x0, &(0x7f000001c000)) 04:00:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x100000000000000, 0x20000102000007) 04:00:10 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfsl', 0x0, &(0x7f000001c000)) 04:00:10 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = accept(r1, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x8}, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) 04:00:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x117}}, 0x20) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = open(&(0x7f0000000440)='./file0\x00', 0x40040, 0x0) getdents(r2, &(0x7f0000000480)=""/117, 0x75) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) ppoll(&(0x7f0000000000)=[{r3}], 0x1, &(0x7f00000001c0)={r4}, &(0x7f0000000100), 0x8) clock_gettime(0x0, &(0x7f00000000c0)) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) fcntl$setsig(r0, 0xa, 0x0) set_tid_address(&(0x7f0000000500)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x2) ioctl$RTC_UIE_ON(r5, 0x7003) socket$bt_rfcomm(0x1f, 0x1, 0x3) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280), &(0x7f00000002c0)=0x8) clone(0x0, &(0x7f0000000440), &(0x7f0000000400), &(0x7f0000000100), &(0x7f00000002c0)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000340)=0x80000001) 04:00:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x76) r2 = fcntl$dupfd(r1, 0x0, r0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000000)={0x2a, 0x3, 0x0, {0x0, 0x9, 0x0, '/dev/kvm\x00'}}, 0x2a) 04:00:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfo\x00', 0x0, &(0x7f000001c000)) 04:00:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xf00000000000000, 0x20000102000007) 04:00:11 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfst', 0x0, &(0x7f000001c000)) 04:00:11 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="15e3ffdfc10ecc97ab8ebfd518d5ba7a75158e2f9c4094e78e744c42fa49ce5af9d13edbff7f82f9943eda7ffdd292558bb2e05fb28fb631642cf88b81cf97105f5c3b403b344e76a9faf470ee474d0a769d8d9f8bd8cb5a0b712c961f4a9c", &(0x7f00000000c0)="6e981be2d531e36881668758ea8bbdf01a53c1657ce2aad7266fdeba3087e534759c95b5738df9ab98c0a1c336b260", 0x3}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x802, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)="2f67726f75702e73746174006f61bc8aebb4d49cb334693d567ec77cb2575f46c6cd325bb15917ca23f0713fccd187d41836028ab8540628bba85c61d6e1c59b299c89c0e449d97ceb6ff43038400451a01b746bf8f18efb4aaa48bd9e328749bcc85d6e872c765e507944bc8b605a1acc4444b00c383f8a2e37f04834f92d42d5a186417a67e53cccae59a1ee20a28937c11a6ecf2ac2c7ba3dbcb147b429a7493209596c45468b546c88998b6f4a9763", 0x2761, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, r3, 0x0) close(r4) 04:00:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xe7, 0x101403) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg$kcm(r2, &(0x7f0000004180)={&(0x7f0000003e80)=@can, 0x80, &(0x7f0000004040), 0x0, &(0x7f0000004080)=""/205, 0xcd}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000001a80)={&(0x7f00000000c0), 0xc, &(0x7f0000001a40)={&(0x7f0000001500)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x44}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xe4, r3, 0x410, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffff181}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x53fe}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1a}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xf79}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2d18}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0xe4}}, 0x8040) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f000000e640)={&(0x7f0000000000)={0x10, 0xf0ffffff00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0501ad9df81800000000feff000002000000"], 0x14}}, 0x0) 04:00:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0xb00000000000000, 0x20000102000007) 04:00:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfc\x00', 0x0, &(0x7f000001c000)) 04:00:11 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xffffffffffffff92) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, r2, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x40, 0xff7d, 0x1f, 0x3e5}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x2f, 0x31, 0xf, 0xe, 0x5, 0x3, 0x6, 0x98, 0xffffffffffffffff}}) accept$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14) getpeername$packet(r5, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000700)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20010840}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)=@mpls_delroute={0x84, 0x19, 0x24, 0x70bd2c, 0x25dfdbfb, {0x1c, 0x0, 0x14, 0x15d03328, 0x0, 0x6, 0x0, 0x7, 0x1300}, [@RTA_DST={0x1c, 0x1, [{0x3, 0x1000, 0x1, 0x7}, {0x1f, 0x10000, 0x80, 0x5}, {0x9, 0x7, 0x9, 0x4a1}, {0xed8, 0xffffffff, 0x9, 0x7}, {0x4, 0x1, 0x2, 0x6}, {0x1, 0x2, 0x5, 0x3ff}]}, @RTA_DST={0x1c, 0x1, [{0x1, 0x8001, 0x1, 0x3}, {0x3, 0x89, 0x5a49, 0x2000000000000000}, {0x8, 0xb26, 0x3000000, 0x6}, {0x5, 0xffffffff, 0x0, 0x9}, {0x7fff, 0x3, 0x1, 0x9}, {0x401, 0x3, 0x1, 0x2}]}, @RTA_TTL_PROPAGATE={0x8}, @RTA_DST={0x8, 0x1, [{0x9f, 0x5fdd, 0x6, 0xaa0}]}, @RTA_OIF={0x8, 0x4, r6}, @RTA_OIF={0x8, 0x4, r7}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0xfffffffffffffffc}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 04:00:11 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:11 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) close(r2) 04:00:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0xfffffffffffffe6d) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006780)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000012c0)}], 0x500, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) [ 426.686923] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 04:00:11 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x40cc0, 0x8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0xa06, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xd2, "d77bd1d2fa8f118194fd2f909c5afa2674bbee23385d549c74a5fd51603113c7a69c2e62e71ef5992b85ca7eedbc63fdcee996b96047bfe6f67aaedb8b0a2ddb38477e820381af32a869be24603784b6a6af181dae2c63f60b28f7ee685d61f3b6dd5c338760a48f39bae87c1949dd2aacef0d46f1f725e5dc8056641c70c6ca4461c68e72c4e5a5565e37b8dba4121e2367ac0a049ff4ab7377be9fe629acb8b5a066ef27d53d953cb57dcd3346d035642a34b9b62d52a2697b39d839ae9b996f94f797bae472b100dfe982ef950fc39a24"}, &(0x7f0000000300)=0xda) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r2, 0x3, 0x4}, 0x10) ppoll(&(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100), 0x8) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000040)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") bind$rds(r1, &(0x7f0000000140)={0x2, 0x4e24, @loopback}, 0x10) sendfile(r1, r3, &(0x7f0000000000), 0x2b428a52) [ 426.731232] Error parsing options; rc = [-22] 04:00:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x200000000000000, 0x20000102000007) 04:00:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfl\x00', 0x0, &(0x7f000001c000)) 04:00:11 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:11 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x8912, &(0x7f0000000400)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x70, r2, 0x13ee1ea57b9f5be8, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4f}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x20000000005}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) [ 427.016737] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 427.038266] Error parsing options; rc = [-22] 04:00:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x100082) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, &(0x7f0000000240)=0x40000000, 0x20000102000007) 04:00:12 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f000001c000)) 04:00:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000100)='ecryptf*\x00', 0x0, &(0x7f000001c000)) [ 427.076077] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 427.173590] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 427.205255] ================================================================== [ 427.212962] BUG: KASAN: use-after-free in _free_event+0x49a/0x1660 [ 427.219298] Write of size 4 at addr ffff8801c8442060 by task syz-executor1/18134 [ 427.226838] [ 427.226863] CPU: 0 PID: 18134 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 427.226875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.226883] Call Trace: [ 427.226916] dump_stack+0x244/0x39d [ 427.237044] ? dump_stack_print_info.cold.1+0x20/0x20 [ 427.237061] ? printk+0xa7/0xcf [ 427.237079] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 427.237109] print_address_description.cold.7+0x9/0x1ff [ 427.237131] kasan_report.cold.8+0x242/0x309 [ 427.237147] ? _free_event+0x49a/0x1660 [ 427.237169] check_memory_region+0x13e/0x1b0 [ 427.237188] kasan_check_write+0x14/0x20 [ 427.252869] Error parsing options; rc = [-22] [ 427.257938] _free_event+0x49a/0x1660 [ 427.257958] ? mark_held_locks+0xc7/0x130 [ 427.257982] ? ring_buffer_attach+0x840/0x840 [ 427.258012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 427.258037] ? retint_kernel+0x2d/0x2d [ 427.258066] ? free_event+0xac/0x180 [ 427.258089] free_event+0xb4/0x180 [ 427.321134] ? _free_event+0x1660/0x1660 [ 427.325213] ? perf_event_release_kernel+0x36c/0x10e0 [ 427.330437] perf_event_release_kernel+0x7d4/0x10e0 [ 427.335528] ? try_to_wake_up+0x10a/0x12e0 [ 427.339802] ? put_event+0x60/0x60 [ 427.343382] ? find_held_lock+0x36/0x1c0 [ 427.347505] ? locks_remove_file+0x3c1/0x5c0 [ 427.351949] ? kasan_check_read+0x11/0x20 [ 427.356123] ? do_raw_spin_unlock+0xa7/0x330 [ 427.360561] ? locks_check_ctx_file_list+0xdd/0x120 [ 427.365616] ? locks_remove_file+0x3c6/0x5c0 [ 427.370054] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 427.375609] ? ima_file_free+0x132/0x650 [ 427.379694] ? fsnotify_first_mark+0x350/0x350 [ 427.384281] ? ima_file_check+0x130/0x130 [ 427.388422] ? fsnotify+0xf10/0xf10 [ 427.392048] perf_release+0x37/0x50 [ 427.395677] __fput+0x3bc/0xa70 [ 427.398967] ? perf_event_release_kernel+0x10e0/0x10e0 [ 427.404249] ? get_max_files+0x20/0x20 [ 427.408141] ? trace_hardirqs_on+0xbd/0x310 [ 427.412465] ? kasan_check_read+0x11/0x20 [ 427.416623] ? task_work_run+0x1af/0x2a0 [ 427.420692] ? trace_hardirqs_off_caller+0x300/0x300 [ 427.425822] ____fput+0x15/0x20 [ 427.429094] task_work_run+0x1e8/0x2a0 [ 427.432974] ? task_work_cancel+0x240/0x240 [ 427.437294] ? exit_to_usermode_loop+0xb5/0x380 [ 427.441957] exit_to_usermode_loop+0x318/0x380 [ 427.446534] ? __bpf_trace_sys_exit+0x30/0x30 [ 427.451021] ? do_syscall_64+0x2fc/0x820 [ 427.455079] do_syscall_64+0x6be/0x820 [ 427.458957] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 427.464315] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.469233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.474078] ? trace_hardirqs_on_caller+0x310/0x310 [ 427.479099] ? prepare_exit_to_usermode+0x291/0x3b0 [ 427.484123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.488967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.494147] RIP: 0033:0x457569 [ 427.497330] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.516220] RSP: 002b:00007f30c91e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.523919] RAX: ffffffffffffffe7 RBX: 0000000000000003 RCX: 0000000000457569 [ 427.531180] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000008 [ 427.538440] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 427.545699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30c91e16d4 [ 427.552959] R13: 00000000004bf5c9 R14: 00000000004cf460 R15: 00000000ffffffff [ 427.560226] [ 427.561927] Allocated by task 18144: [ 427.565633] save_stack+0x43/0xd0 [ 427.569073] kasan_kmalloc+0xc7/0xe0 [ 427.572817] kasan_slab_alloc+0x12/0x20 [ 427.576806] kmem_cache_alloc_node+0x144/0x730 [ 427.581383] copy_process+0x1ff3/0x8770 [ 427.585353] _do_fork+0x1cb/0x11c0 [ 427.588895] __x64_sys_clone+0xbf/0x150 [ 427.592859] do_syscall_64+0x1b9/0x820 [ 427.596747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.601945] [ 427.603569] Freed by task 18144: [ 427.606948] save_stack+0x43/0xd0 [ 427.610416] __kasan_slab_free+0x102/0x150 [ 427.614660] kasan_slab_free+0xe/0x10 [ 427.618455] kmem_cache_free+0x83/0x290 [ 427.622418] free_task+0x16e/0x1f0 [ 427.625946] copy_process+0x1d99/0x8770 [ 427.629909] _do_fork+0x1cb/0x11c0 [ 427.633436] __x64_sys_clone+0xbf/0x150 [ 427.637401] do_syscall_64+0x1b9/0x820 [ 427.641282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.646469] [ 427.648086] The buggy address belongs to the object at ffff8801c8442040 [ 427.648086] which belongs to the cache task_struct(33:syz1) of size 6080 [ 427.661621] The buggy address is located 32 bytes inside of [ 427.661621] 6080-byte region [ffff8801c8442040, ffff8801c8443800) [ 427.673517] The buggy address belongs to the page: [ 427.678434] page:ffffea0007211080 count:1 mapcount:0 mapping:ffff8801bd9de480 index:0x0 compound_mapcount: 0 [ 427.688390] flags: 0x2fffc0000010200(slab|head) [ 427.693053] raw: 02fffc0000010200 ffffea0007390288 ffffea0006043c88 ffff8801bd9de480 [ 427.700927] raw: 0000000000000000 ffff8801c8442040 0000000100000001 ffff8801d59585c0 [ 427.708800] page dumped because: kasan: bad access detected [ 427.714505] page->mem_cgroup:ffff8801d59585c0 [ 427.718985] [ 427.720597] Memory state around the buggy address: [ 427.725513] ffff8801c8441f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 427.732875] ffff8801c8441f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 427.740224] >ffff8801c8442000: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 427.747583] ^ [ 427.754060] ffff8801c8442080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.761423] ffff8801c8442100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.768774] ================================================================== [ 427.776132] Disabling lock debugging due to kernel taint [ 427.785763] Kernel panic - not syncing: panic_on_warn set ... [ 427.791697] CPU: 0 PID: 18134 Comm: syz-executor1 Tainted: G B 4.19.0-rc7-next-20181015+ #94 [ 427.801571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.802964] kobject: 'loop5' (00000000c4a08b1a): kobject_uevent_env [ 427.810927] Call Trace: [ 427.810950] dump_stack+0x244/0x39d [ 427.810971] ? dump_stack_print_info.cold.1+0x20/0x20 [ 427.810995] panic+0x2ad/0x55c [ 427.832643] ? add_taint.cold.5+0x16/0x16 [ 427.836819] ? preempt_schedule+0x4d/0x60 [ 427.840977] ? ___preempt_schedule+0x16/0x18 [ 427.845393] ? trace_hardirqs_on+0xb4/0x310 [ 427.849723] kasan_end_report+0x47/0x4f [ 427.853700] kasan_report.cold.8+0x76/0x309 [ 427.858027] ? _free_event+0x49a/0x1660 [ 427.862011] check_memory_region+0x13e/0x1b0 [ 427.866428] kasan_check_write+0x14/0x20 [ 427.870494] _free_event+0x49a/0x1660 [ 427.874310] ? mark_held_locks+0xc7/0x130 [ 427.878468] ? ring_buffer_attach+0x840/0x840 [ 427.882977] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 427.887746] ? retint_kernel+0x2d/0x2d [ 427.891656] ? free_event+0xac/0x180 [ 427.895383] free_event+0xb4/0x180 [ 427.898930] ? _free_event+0x1660/0x1660 [ 427.902994] ? perf_event_release_kernel+0x36c/0x10e0 [ 427.908196] perf_event_release_kernel+0x7d4/0x10e0 [ 427.913215] ? try_to_wake_up+0x10a/0x12e0 [ 427.917458] ? put_event+0x60/0x60 [ 427.921010] ? find_held_lock+0x36/0x1c0 [ 427.925082] ? locks_remove_file+0x3c1/0x5c0 [ 427.929502] ? kasan_check_read+0x11/0x20 [ 427.933651] ? do_raw_spin_unlock+0xa7/0x330 [ 427.938066] ? locks_check_ctx_file_list+0xdd/0x120 [ 427.943097] ? locks_remove_file+0x3c6/0x5c0 [ 427.947514] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 427.953055] ? ima_file_free+0x132/0x650 [ 427.957127] ? fsnotify_first_mark+0x350/0x350 [ 427.961713] ? ima_file_check+0x130/0x130 [ 427.965868] ? fsnotify+0xf10/0xf10 [ 427.969505] perf_release+0x37/0x50 [ 427.973140] __fput+0x3bc/0xa70 [ 427.976427] ? perf_event_release_kernel+0x10e0/0x10e0 [ 427.981708] ? get_max_files+0x20/0x20 [ 427.985600] ? trace_hardirqs_on+0xbd/0x310 [ 427.989923] ? kasan_check_read+0x11/0x20 [ 427.994076] ? task_work_run+0x1af/0x2a0 [ 427.998144] ? trace_hardirqs_off_caller+0x300/0x300 [ 428.003255] ____fput+0x15/0x20 [ 428.006539] task_work_run+0x1e8/0x2a0 [ 428.010435] ? task_work_cancel+0x240/0x240 [ 428.014764] ? exit_to_usermode_loop+0xb5/0x380 [ 428.019449] exit_to_usermode_loop+0x318/0x380 [ 428.024038] ? __bpf_trace_sys_exit+0x30/0x30 [ 428.028539] ? do_syscall_64+0x2fc/0x820 [ 428.032608] do_syscall_64+0x6be/0x820 [ 428.036504] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 428.041877] ? syscall_return_slowpath+0x5e0/0x5e0 [ 428.046828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.051678] ? trace_hardirqs_on_caller+0x310/0x310 [ 428.056704] ? prepare_exit_to_usermode+0x291/0x3b0 [ 428.061732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.066584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.071774] RIP: 0033:0x457569 [ 428.074993] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.093894] RSP: 002b:00007f30c91e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 428.101612] RAX: ffffffffffffffe7 RBX: 0000000000000003 RCX: 0000000000457569 [ 428.108884] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000008 [ 428.116153] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 428.123424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30c91e16d4 [ 428.130696] R13: 00000000004bf5c9 R14: 00000000004cf460 R15: 00000000ffffffff [ 428.138844] Kernel Offset: disabled [ 428.142473] Rebooting in 86400 seconds..