0xeefffdef) ioctl$VIDIOC_G_ENC_INDEX(r6, 0x8818564c, &(0x7f0000000cc0)) 14:14:20 executing program 4: socket$inet(0x2, 0xb, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0xa080, 0x0) readlinkat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/62, 0x3e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$P9_RSETATTR(r3, &(0x7f0000000180)={0x7, 0x1b, 0x1}, 0x7) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:14:20 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:14:21 executing program 1: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r6, 0x1000000) 14:14:21 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:21 executing program 4: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:21 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 849.030109] protocol 88fb is buggy, dev hsr_slave_0 [ 849.035284] protocol 88fb is buggy, dev hsr_slave_1 14:14:21 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) 14:14:21 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:21 executing program 1: socket$inet(0x2, 0xb, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @broadcast}}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="ffdf009d7eae868ee98084e101427fafaa7011dc6242bdfa846211a6be6aa84608c324a0693814c0dadb1d187e877e1f069587a07341af0721f217ad5580022568af43d06b9fe00b8b2876a99233f5e8649df6381011b15facb9e7a45a65760b7e8fd08fce3ca3ba6ca4c14f4da4b93be7138ae466e901ec6e3bb382db41aa6f46a26c95790d5b83b110524d7b7160408329be39485d010d6f381a93e99b813a548020", 0xa3}, {&(0x7f0000000240)="7a4ca5bb2f85bfb60acf1c211a3c8994a83a347344126825248d908c7ec90ee0bec34173667027daf49311ab2fa2c8448b942d050ddff39b58227890c99d64f7476e973f82b9b6ef74539b0ffd6c65324969d13d6d641d1d7d96c6552f9928b2b13656c64321bd4128ad002a38f2b26fe8bf6628637bebb7d003f4f43ae67c94f72bdc673572821b2365c20d6d6417eb17c117", 0x93}, {&(0x7f0000000480)="11c018c470f1886d9e9c938b50dc0a842bb6ca9257eb28834b5ebddbf7baebcaaf83edcce4fea07231146c089e2fca8d548247303d5f36631d5718048d556d904e04052d4769c639f0668a2fce2df935cfcd1c919cab7bc0aa7e992577162e6098ce27f9d9c26b81b6a01f5ed4ba6552e35733c4f1b875789440d66934251a2a0c64b52cf64bd9bc973e70cce41cd3f54d02f7b906eac0aa42132b", 0x9b}, {&(0x7f0000000540)="3e9fa4d0572b64e1b9be2588b3894c4a441eccf43faf8c1473db69a0bf1762c2648628e8ca24fba25b1393fa442508209f0fb0a549e0f4dda2fbcb82a263f8492bc68ad320c22cb793a34623ed87e343cf1b356a47a2c3cea7bc53ffa46463cf9ad452e7e4b7aa421cdc18dfdaaa0d457e2446c400e7c80628b3da3284893acab653ec405ac9725788a732d1eca75c7c9bec0d2f33973df5db03b5ee0ff06bb0d688f7fdc850f462ffa0", 0xaa}], 0x4, &(0x7f0000000600)=[{0x50, 0x116, 0xa7a, "7a9f6eab21e5db4fb6d1f28441e07be7608b89254eeebfc0938eb68c96cffb7b926800cb17bb5ec0b85a63b154c14844b437fb430ef67467cec6"}, {0xc0, 0x0, 0xa977, "37f8713d5c727f39b79e97dd8292f7ba110510db54231a011b279623c166dd2dba4e2e9330ad02f36fe3ed64d39247243c32b8e74515dfe4a73b3479994d330734d432d96d72a6b0dc8a46e4d65eb952a07f66316d5b595ce7d2b71b8cf123c2b78e8cc0338c6b0bb49b6d3ca4e68851c4c63b7fc7a7ae810f6249ace77aa99c42c35ac63df79f50658c68da507deb739415ee5bf4ab493a161a9153cfbff787a4de33288c77dc5798ac1aec57a0"}, {0x1010, 0x11, 0xb9, "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"}, {0xf0, 0x195, 0x2, "0525b8dc4da007f4c3c8b994ade9a798611ee3dc1b44bd77264ebb9598b9df2ba89a523934330a3352eeb3cf48113e2cc0fbdc8168c3246005b17dfce0779dea24fb4ab98a5c0c0d44f2586c7590351265a30ab4182e389b595695f8cb05a270c3028f7cfc537e2d335489a39eaec897b550a9a6d0cabaf4130e30bad7ecf801e5f464008030f653a4c12020ba1f7b9d129ace8cca293577ff0e4a66b230b37cc2ae66c30dd9de3e5ea14d846886e3add71b92abc4acf20d9bcb56621ce999fd7c66362631338542c6b75fd516267acf787a95b1a3ce5a683bc8bb0db72281"}, {0xb0, 0x114, 0x1ff, "19cd4d8e1b79dfbbf9bd9499261da06ba4e06586dbc39b9d2b8b9a90f259219a5d51efc12778b4d3f279693c2ce21d323463a62423b51c23176a992823afced82dccbaf09ac015996600b634952ff7bad331ed097c85b5b8116e9df54714e15a7995f2115df8e9b66ee42d80649312e9f40add8a4acd902b1377e97e84e725a1492524f594288c5366f4f8db339972c8c44d20300c054e5b8e0c937d7c"}], 0x12c0}}, {{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f00000018c0)="5502c82238b38ef1f18a692d011fdbea6c72aea62b3d7a94baab670e3d81eea678cdb0e759d271ee7ffeda3827ad0e03357fbcb5833834689aa4957b35da2a10daf0239c841bae47d109443cdca61e0c0c304fabb644fac33d777196c18f89299d6e09a0932ef85dbb1954bff92cec1290352e476d71e039789d4b9a867c9fd17cf7188db4c0f1f3e0b946d6545cfa32f9d0", 0x92}, {&(0x7f00000001c0)="d7a2d805f77fc103cc90dad73e00d7b702e4f3d55f1a318948da03", 0x1b}, {&(0x7f0000000300)="362e1e00780ce5f6d7f87c66bc2f5072362cd9326c8264df6ec506", 0x1b}, {&(0x7f0000001980)="3716d4375676d8f1481e27bfd29ba33ea82da9ac70d0ef0fcc3f7dbd5a2951cc8fe661c18671274acae669bad90279e02be987b61eb36c992efab29d6a280cb6504c81ac94bf9b35e4e3d5a29255ed50107d62be5a7516ee114160d943245e6a7a5c2de4ad519e22d4887dd6d675a6b8852863854ef3287ba9d4505322d32cf5ce54231cb41202eb922a65f6fc22bc1fa6fedb76df7a72c34cc1d848f24206eb4cd5cdae6d0d37bb5c66d828800f9aeaacc8da0b1963eed444f3aeb76f159c4ee32e3ebee74633ba97181cec7bd6c9aa7366db98e9320a13ceb38c79264e33997138f6beb55aa3c88c72b74a5695691e314bd72fecb39a", 0xf7}, {&(0x7f0000001a80)="617bd8e2ed97f3eb1061b774c35edc8579cc16f6ce9b70ebe9c7b1bfb205d366505c2279c0c6f4c551c11609f912bf9a18ab8a1419eb8da580c8c13ca5bc7ac1a03cecc70cf566e1a29824bca8b3ae10542b325d3a6aaf3a02f090c23f00c9f6ccc9ac6fe0381da0a8753643f49ad636e2aaff6719f39206af94d9a52cd1bb46514224f7a5b2", 0x86}, {&(0x7f0000000340)}], 0x6, &(0x7f0000001bc0)=[{0xb8, 0x84, 0x3f, "048c54c02c84d2e68e2ecd4d2a19f174341e2b5bff593698bad39b332ea01f5c8c3596948e8636834519a7624c133f82fd926ac02989e180ef8c717fb25a6d2e183dffd3f5c20b87e3faf91f1d1f93ad70818464741c024feba1a212cc24b71215bc1c4c6ce33769269f4d78b84810252c37eac40cde1baa5fe4b0819fd152ab547ca5b2d9d5c648ef9fc56507c16989c5aa84956a1dedfd50fec6cc7c54a509de592cf024"}, {0xa0, 0x114, 0x92, "b352ba1da3a8f75d689c0d7ccb903f0d931dd55b38a75572818371596769b4871ff1b69f6450ae8866c74c18462553c0da54f33cd35034a9daf4c7360500f0f7b824012b459dd8d19c458aa2a5ff7b9f9fe4033304836a797a409e229646dbe86f2a62bedabf379fab2f0b858e0763455f8c34437d95033430c918dcf1bd7e61be146b65fbdc3ccb410a"}, {0x60, 0x113, 0x1, "5c0d75bee0959c676c6f1aab6764caf1e4c7a789f9d595fd9a0671bc435dad675f093a377770c03931eece7222f575ecf3d254d3672784d2acfffa702a987b7cf3b7f94213ee4087178665"}, {0x110, 0x111, 0x8c, "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"}, {0xf0, 0x10a, 0x1000, "8f8aec8223c0919f63f422f8d22d11df57c239d402e24144c505eeb838c873e41d8ef976892704e57f9ac3371df3e93d5f74f06ce8495170450a95ce6ce3b03541a7082b652cb4acdec5f21d588d3ad76923dd6eca0c2d6c019965047f54850c1e72438521fa85c2bb3571bc72760495eaaefbdbc0baa8409e5c4646854f49dde6b16f9e26d79898985d659595db585fdc435e1b8c6deb671d437d8d707f0a84df40628a031662f27115475fa93a9c2d34732b3f2968a379f715ab1510639b0d6affb6744e90028de8586b99cd52c35c0f12a2a4e2a97d8ed51484294c"}, {0x58, 0x5, 0xed7, "2b5251fa1e449e7e6b72a224005f2db51dd1db2bc98a7b6a71841983c218205a981020387fa5398c1a1a8f39aa953c1430123827e32e24bb4539f0f621fb5bd404"}, {0x68, 0x20a, 0x100, "6dc18f4028a4aea829561f27497223032ce8f95b6e2c5a9bf9fbbc763e6d64493ffa4b75b81d432279e14de89b2e46878b057694d6d5f774d986aa372fbaee532f72a05020ac0fd9e849f0b206214cd6e36ff47d767f90"}], 0x478}}, {{&(0x7f0000002040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0xff3b, &(0x7f0000003300)=[{&(0x7f00000020c0)="d0f7c0a18ebd468c890cb0dccda0c0962eeec173266a1dd8c6f22c20c59f2546f4dbfb84b434a57d75d7d48c37a88ddc807e546352f64a247300310e90c6608031cc01998aedfc7604202d4dc7f2d003721918a6a2f30399cab838835e2ab5cf9e04a7a652926ca63a261a4046bfb22753dd68f9f0a7b09f9228bcad387a368939a6f7f0fbdfba75d1d355763fd85eda95f4303426aa5cbeb07e964320187d1096cae4a2644e285a26919b3bf12add189e1fca1527d168bbf5831c6b6af6303dc8501ea8005d7d3b3f817c2c269c11b2df6803b294cc4a7dc6cc825e65647a7443d509c641e0bd2af6f042c5895a", 0xee}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="32d721c9634ea0f3db80ae619edb91a7c843b813015afaf77afc900b4b77a466529e5bc9961ad3e10f4013b6804a34005d97ba566d0c2886d12ed5586a0159001671c92f4135a735488402edb19e00d1a7858c91c959317155bd80598cb1888da7945ff76e2d2ee68ded3b6eb1b470028fdbdaeee7a1b520243d49a7c70f0b6622c6d3a82308d393d6e46551951e39aa82c61afd8a1a98365c27d7172662742c0c9a79fa430e9e500e20987b9cdade3559ed163c244aa1d4ebf0a315b3c1579b15df288b14a45e8754566b4d44ec74a2f7d61e319d1df2cbc06b7d2dfdc541743c90ee8e047938d3a7abaebb", 0xec}, {&(0x7f00000032c0)="bb6632958a8145591ce5b2c6db16dd3611f2d8163d4523ec73209b0f3545575386207ad631c6b9811d7a14fc41bb200998082b9ee86b1054bc", 0x39}], 0x4, &(0x7f0000003340)=[{0xf8, 0x102, 0x8, "369e48d030849b6ea67d0013cd3de8d1fdffbd08d881623e746d090ceb6f0a4c785261b811016fe987b59daaa106628786393bae722da0cbbf0c58c5111939b7c0015c6c7e2ecf7e3cc7581ef92cb1b9b11bb02b0dcd68f0618620e28a19d53532160d17e4a7010ab5dfbdd74296ffafa729f314e5d4946d38ef2bc97a595aa67e63c381cd4104c27df528c6907391fd6387848a5e3a810f372d6668a7971ac41477b0d20c437208eaa35e9de00d7379a69fa0ecf880131a9830211239dfd687d87c1af44be87c7462f145f2b717cba22af1a79b81114090253d796e7094ff7fbba75bd3605174"}, {0xd8, 0x11, 0xffff, "38609b502e95cfcf453c96a67553b7ea3b1c7142e4bd648d2d03a26f1c0cd1254bfa7f0936b40905a64f8e234c5c6baf1b29594cc5e0609fe12db4d259ec6c2ee16773a04a7b2e7ee062b508bd827db4383e7e79186f265ff720dab0538aa2119c8034af1ab33c24f0d84f99bde138eddf0065376a4a629d92abb95a0bdc685e911ad159a00b86864263d35f59e1197eb0943e6145f6c697c02872c788d565f0b0bd3bf2b833808404a17e5b32b383acc1d40602911b9e4f2d3b50bb2297a74e9438"}, {0x48, 0x303, 0x6, "23e426288a3a8dc6855752984b3309f33c1543ffdd983e97c402e7c1535997fba8a3dd42fcb23fad96604c03c4a140d9ac10a5ab"}, {0x70, 0x119, 0x9, "33ca9b20ad265e95ead8e9721e78cbbfc28d23b57628b7d712d595e76cc6fcddbc8cd34739cf8c4b2b5f9fa419678119b75f7a8bda09e642dea82ec0541337a97f4b2019113e406fb1f1f5c72353a33cfa8ac1e6f1d37241211ca35698b34f"}], 0x288}}, {{&(0x7f0000003600)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x80, &(0x7f0000003700)=[{&(0x7f0000003680)="2849c65be6921dc7f1de350a20524f8ba9da622a878931d26fdf8dba2e7f8b9e7d3152370c4e64afba8f3cf663183b80", 0x30}, {&(0x7f00000036c0)="85ed38a5bf333c3a688e70ff6b68bab7", 0x10}], 0x2, &(0x7f0000003740)=[{0x100, 0x119, 0x3, "aa587b9189024c7b5fdba79af1a09dc8893bd2c0a6fc2f4d29fbf0b1bfbd1b8d1508f6b1b68004aba1a4afb35252b04697ffaec8a93146911c453f0a52739cc71baa7d664c4b64646b82d78e2f4ea61dc438e95365bb24e6346c71bb0b8eee95a3ec9c9f370071e4882928aa125bd29c4247de2ed7c4902358734025c074d0fb7a5de0f4d6b22cb181a6df6aa7ceb8171f6dc02b5257609d5a9e81510e7d026cbb6a1eac29850c77359c3dd30ef23f8c2088e333d4360fd48a93dd5183dd644655066f574d7946b146ab838bb6b5299ace52a38ea86e6ba47c77cdca1019443b43b01fc6a640c5b5cd2c"}, {0x88, 0x110, 0x7ff, "15f642cf3c1a116e5835b58520fe9e73a6fc7bb62adc6eb107399a68946d4abc82d180005902cca5244a8a5d41d451c19a7e7a644babd357656a224e66cf42f8152acf59834641652fac0e5b0f563d38f5834ea87a62ef799c2702a97002be9fe3af98747614a3734d84b502d0ad554d7c783fcb"}], 0x188}}, {{&(0x7f0000003900)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x200000}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000003980)="07d9cbf7d6784447ce9c828c3edb456d9a2e916436c966f52af7714334021f1df66fee32435612be1d5c7b162b5598474c8eb7e6c9be5142ec8e91edfcb85fe9fb26cffe3112f32849477d09defe6a951ba4b606f7641f71cde9ee40364571a8889cdcf06f47e54022bb97aa38ee61cdb88500a313c4727d94343dcee298757aa07707c963c076311d461f8b959700a48b1f2794ba2a1ef0c232a656185464f8e3d9a879f54e9cca48214fb153910e1b09d304199a383869", 0xb8}, {&(0x7f0000003a40)="c175d0990cfc259d5e88cf5db2f8819389101085f86a1f8eabb48c36a2f3833a638e55033763477f7d3afa050b1b438a3f0f68b5413cd7c088c377aa859ba5732f7d27d77b77e7f33d9351b4052fa4db357d55286afe9fd9", 0x58}, {&(0x7f0000003ac0)="aa8bd9ebe2c196914fe235b5d80fcb8315ca59967a48d16451c63bbaa8d785a91136a452c8ecd236e487dcef7a548600bec32775b7b9970f1332863d6eae2d08d6844ba2bbbd2e9e723a91950296fbcd164b224e90cdabdd132abfa8099c1bc19e45de7c5918fc466b633973ef1f503d497ff4c9d17aa2f18ab506c000eafc", 0x7f}, {&(0x7f0000003b40)="05a8d9fcdc197464ebe02696eb08a465a208dd29e1cf098d93b12c4c089ebd086ec4981c7c63ab53564d8323df4079fd1fcb47eb629133f0a333ffa2f3634373a93a50cfa4227fdd2e20a5afa95200dd9f6f39643ffd060a71fdaf13eb85b687dc9c44e341db0dd98bc634025d15394504160abfdb517f3ce599355a0cd54ac92ffefd5e7bbe", 0x86}, {&(0x7f0000003c00)="0dfbe8d0feb8a00e27935c23860aeb09375e49118923", 0x16}, {&(0x7f0000003c40)="0af15d75d89e4af1bd7985dbf68eafe31e30063120b67224d114888685c1f9ad3eb98f51c71b0b51354426724fa520ce2ff999740c0c6922f9386062c241439392c5d0cafb0a9aaeda4df32d7fbca25992846e958eb8f2f15ab8dda280350d86b7cd3202da86dbd6bf31fdf06040cd83b1b8fa47ae8f09a1e71dfb0a79714f9149136e5377922a6fa19b93eddedfc3066fd00bdd3164d857f197e752be0d315c9a2984d80bd367aafc62626a9461b9c8c6e566a5c60afd56b45fd9c842c30f46c552b9a3f6e9e41976a562884fffa92b4d98754ff717ad8fdfcf3a957f36605cd77f8f755d7c6182f8be2a6a87424ac388", 0xf1}], 0x6, &(0x7f0000003dc0)=[{0x38, 0xeb440b92adc8689, 0x13, "b127be6e3388b5994317943e3c0430195913b615750b7981f03060923422139b58de"}, {0xc8, 0x1, 0x4, "66d4e2bb0fb7bbc6bae4cbf5c3d1fe28900390c68ae85642c24231c4bc752c1cd8bedc642a219136c5438560f60464240f6b4564bb521c6aa76c46e0b99b65a7aac43f4edd463460c44984ec39d374ace38941e0576c823f250c37e3ea12569cc0df5ef5f1827e363a340cbc5c3233bd5c1c1e6b1776416bd7c77642d531d1b3d703d73c1a0f8d12946894f99a59f09a0992c4a3ffdb09b1eb23eda0687d2ee5cced6fa622c3318a9b10657e431f90bec34148cafb"}, {0x58, 0x114, 0x0, "3a10c26500af6024ec216ddd307d9a932d30eddee6461c54630176e4401a5daeca20b8322f6ce29ca11efa9f71db80e872f566ed42dbaa0dd696297564a83ee1efecd81a9131d3"}, {0x70, 0x116, 0x9, "7aca0ed2d3b6cd9bf47b710c50245fb34c95d4607a208b434edf6ea60ee3af3ad902c0db2782bc0b3bed9313082e9b4c96db088f8f7981ce663f5d5e54e97ece9fa5613fb1f98dab5f8979957b1282da546479eb621f459845ad54992f52"}, {0x110, 0x0, 0x9, "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"}, {0x38, 0x111, 0x80000001, "515b6b7578044e00fe405c545cdf1d10d6a0a3123af049fc11a379ddae50735559b26d"}, {0xb8, 0x101, 0x7, "2c6ced901f8bb62bfb017eaf5dd50bf26078d0909006f9082b9fdf5c70e29e29cae9985c431b989ecce38299c7d2d8ecdba02e2b353fa65ee14750d82abde680d5dba8e3ff299be4ac5a2905e1f687d22ba0a13d27ad62cb1ebb2cbd89e6f3147d653ae3cc857a89fbffb4627f08bbcd34ca4a04dd3916b358b7f36feb116aa38f3d1836a1ccf067b887d542f305a567c90d3970ea85d2d9caf955f92b93b1f36f3a"}, {0x18, 0x0, 0xfffffffd, "170bb7cc45"}], 0x3e0}}, {{&(0x7f00000041c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004240)="66951f58942e3fd2f218e3cdee6a022ef8be25a3980b215cb9d732e07c19d70f064690d1112c4bd4", 0x28}, {&(0x7f0000004280)="659761092cdca9ea38e7ad9f50217179794ea850fb21487c53b1b306534019a05cdff42291ca3aef06a5584faf6423fbd94f9aad010104cbdeed90b5a51106e4e51a74f54b126f9fcff91df58ec46f7df333c2bc2898dc17e17009177fced1905a7b056e93757cd02d40eefcb6401246c69bd7a01be2d5816c81fc9a7ad4a6ceed1e0ff0f19b399b4202e1df3a95218c58bdc4b0fe51d5cde9cb97f4b1a1c06d6a284eecb26c0c3c9a881954301dfa1b", 0xb0}], 0x2, &(0x7f0000004380)=[{0x68, 0x114, 0x7, "7184fc47c342f22244f073e0eed4a5ae593ce4b13788c1a8c289700121c1e9cf0ca238dd89612ce59a08f4514819a5cc3834ba78f484c0dd75099a30a7a0f45117893215fe27c4160c0f9321e94613ecd8c4b2"}, {0xb8, 0xff, 0x80, "902f087b6b6d12dc87a0afced8bfced783439296fd0ee98c2e6ad8fe9aade186e39365306ea27cf2b9b8d0551c023eec201b890a32e618b5529f6f4ebcdfcfbd99a0fe60c7f045653505472c8a37cabc85bfa137ee02f94dce2e18a83d1bd10e876d6c0d47444b347527d436f93d118ca174ddd16ecc7a80d38fc40485da5f24fad234ee70db568c82d63eb06d18f6cc3458ffa1b4bb0078aa99ece118436c197dcc02"}, {0xc8, 0x10f, 0x4, "1fa94c2fb63ca3b87381cbd815596ed81ad1a12b28e337e4669907ca6390be3a4b269f23e5c0fbefd0f94c3e4f3e9732697ebb72bca0ed424e3777c683ddd3a869188a7a24f0532b6af75357c7ff7ecdf4dc260864749b644d0d64af30ae9e190251085aef4aa08c19163a421dc0086206ffa1c99b275f8567111785ec8f7b96a6cf3e40bac645ad877a8bf8ff48a267494d130497ccefa294ef4592fb8aa836697f20de0a1a78ae704140877d829bde3d3e1efd"}, {0x30, 0x104, 0x2, "1f4e966a8072aa69455ce2f24d367af2b3238af3b79ea758c2ece2c2c693"}], 0x218}}], 0x6, 0x1) 14:14:21 executing program 1: socket$inet(0x2, 0xb, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x490000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x400, 0xb, 0x4, 0x4000, 0x9, {r2, r3/1000+30000}, {0x1, 0x1, 0x1, 0x1, 0x40, 0x4, "fa0c4bd7"}, 0xfffffff8, 0xf6f469fe30f80f12, @userptr, 0x6, 0x0, r1}) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000180)={0x1, 0x3f}, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:14:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:22 executing program 4: r0 = socket$inet(0x2, 0xb, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 849.350148] protocol 88fb is buggy, dev hsr_slave_0 [ 849.355322] protocol 88fb is buggy, dev hsr_slave_1 [ 849.360497] protocol 88fb is buggy, dev hsr_slave_0 [ 849.365575] protocol 88fb is buggy, dev hsr_slave_1 14:14:22 executing program 4: socket$inet(0x2, 0xb, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) accept$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast2}, &(0x7f0000000280)=0x10) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000680)={0x7b11076e, 0x1, 'client1\x00', 0x1, "e78cba73095af896", "46d8779cba9af215b45289b6350327862f77825c12cb7ad90e6af50225de298a", 0x8, 0x3f8}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r7 = dup2(r2, r6) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$DRM_IOCTL_SET_MASTER(r8, 0x641e) ioctl$SNDCTL_DSP_CHANNELS(r7, 0xc0045006, &(0x7f0000000140)=0x9) r9 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') setsockopt$inet6_tcp_TCP_ULP(r9, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x3, 0x4, 0x4, 0x20, 0x8, {r4, r5/1000+30000}, {0x4, 0x1, 0x9d, 0x3, 0x0, 0x8, "c063836c"}, 0x0, 0x7, @userptr=0x6, 0x80, 0x0, r1}) r11 = socket(0x1e, 0x2, 0x0) close(r11) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r11, 0x84, 0x1, &(0x7f0000000200)={r13, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r10, 0x84, 0x19, &(0x7f0000000100)={r13, 0x401}, 0x8) 14:14:22 executing program 1: socket$inet(0x2, 0xb, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x490000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x400, 0xb, 0x4, 0x4000, 0x9, {r2, r3/1000+30000}, {0x1, 0x1, 0x1, 0x1, 0x40, 0x4, "fa0c4bd7"}, 0xfffffff8, 0xf6f469fe30f80f12, @userptr, 0x6, 0x0, r1}) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000180)={0x1, 0x3f}, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:14:22 executing program 1: socket$inet(0x2, 0xb, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x490000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x400, 0xb, 0x4, 0x4000, 0x9, {r2, r3/1000+30000}, {0x1, 0x1, 0x1, 0x1, 0x40, 0x4, "fa0c4bd7"}, 0xfffffff8, 0xf6f469fe30f80f12, @userptr, 0x6, 0x0, r1}) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000180)={0x1, 0x3f}, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:14:22 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @local}, {0x2, 0x4e21, @local}, 0x32, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000040)='ip6gre0\x00', 0x0, 0xfffffffffffffffb, 0x401}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e24, 0x1, @rand_addr="d59fc835807c39c34a1153d37089f7db", 0x3}, {0xa, 0x4e20, 0x400, @remote, 0x6}, 0x200, [0x9, 0x1f, 0x7ff, 0xbb4e, 0x0, 0x2, 0xfffffffd, 0xaf9]}, 0x5c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in=@rand_addr=0x75c6, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1a0}, {}, {0x9f2}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) write$binfmt_elf32(r2, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x8a, 0x0, 0x9, 0x2, 0x4, 0x3, 0x70, 0x1f, 0x8b, 0x38, 0x364, 0x7, 0xbfa, 0x20, 0x2, 0x6, 0x0, 0x200}, [{0x6, 0x0, 0x9d, 0x7eeb, 0x4, 0x40, 0x1ff, 0x4}], "4f189a07bfaf4ab057bc7d23cb30a79021269cd378f3556ca4c72a907ce87719ecda23a0fab58b98596ec4a769e94bed2942bce7013cf106f58b7d3bf941efbdad6b08309878636ef281ec2a050154ca4559da17d618c16497439e77304097e908455d2a337c427e5be753609ff26aac80f62efb62385b74e085466f7cb2bef2038156b4f29846466e8a27ca03459ab1d158faf446bb80b7314d2d36ba2cb422a697cd897e07b2db6f3d72c0c60cdfebb731400bab5a0044263dc5d6b034b614bd8e123fcb", [[], [], [], [], [], [], [], [], []]}, 0xa1d) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:14:22 executing program 1: socket$inet(0x2, 0xb, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x100800) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x1, 'veth0_to_hsr\x00', {}, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x2, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 14:14:22 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:22 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) 14:14:22 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:22 executing program 1 (fault-call:7 fault-nth:0): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:22 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x60200, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000080)=0x1, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000001c0)=""/103, 0x67}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000280)=""/126, 0x7e}], 0x4, 0x7) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3, 0x4e, 0x4e, 0x1, 0x0, 0xfffffffffffffffa, 0x4000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x9, @perf_bp={&(0x7f0000000340), 0x2}, 0x200, 0x10001, 0x9, 0x9, 0xa1f, 0x0, 0x2}, r3, 0xb, 0xffffffffffffffff, 0x98a4154a01e83ded) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_buf(r1, 0x0, 0xde588fc643d3dfcd, 0x0, &(0x7f0000000000)) [ 850.051616] FAULT_INJECTION: forcing a failure. [ 850.051616] name failslab, interval 1, probability 0, space 0, times 0 [ 850.066159] CPU: 1 PID: 7548 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 850.073968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.083337] Call Trace: [ 850.085923] dump_stack+0x142/0x197 [ 850.089567] should_fail.cold+0x10f/0x159 [ 850.093714] should_failslab+0xdb/0x130 [ 850.097689] kmem_cache_alloc_trace+0x2e9/0x790 [ 850.102360] alloc_pipe_info+0xb0/0x380 [ 850.106323] ? save_trace+0x290/0x290 [ 850.110173] splice_direct_to_actor+0x5d2/0x7b0 [ 850.114868] ? avc_policy_seqno+0x9/0x20 [ 850.118925] ? selinux_file_permission+0x85/0x480 [ 850.123770] ? generic_pipe_buf_nosteal+0x10/0x10 [ 850.128613] ? security_file_permission+0x89/0x1f0 [ 850.133539] ? do_splice_to+0x170/0x170 [ 850.137509] ? rw_verify_area+0xea/0x2b0 [ 850.141567] do_splice_direct+0x18d/0x230 [ 850.145813] ? splice_direct_to_actor+0x7b0/0x7b0 14:14:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:22 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x30, 0x0, &(0x7f0000000000)) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 850.150661] ? rw_verify_area+0xea/0x2b0 [ 850.154737] do_sendfile+0x4db/0xbd0 [ 850.158461] ? do_compat_pwritev64+0x140/0x140 [ 850.163051] ? fput+0xd4/0x150 [ 850.163064] SyS_sendfile64+0x102/0x110 [ 850.170305] ? SyS_sendfile+0x130/0x130 [ 850.170315] ? do_syscall_64+0x53/0x640 [ 850.170323] ? SyS_sendfile+0x130/0x130 [ 850.170333] do_syscall_64+0x1e8/0x640 [ 850.170342] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 850.170357] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 850.170364] RIP: 0033:0x45a919 14:14:22 executing program 4 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 850.170369] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 850.170380] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 850.170385] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 850.170393] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 850.228957] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 850.236235] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x65, @mcast2, 0x3}, @in6={0xa, 0x4e21, 0x800, @remote, 0x4}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x48) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r4 = socket(0x1e, 0x2, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="ee77156fd7fbf456b743a2a8c09cc6", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r7 = socket(0x1e, 0x2, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000200)={r9, 0x5}, 0x14) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000200)={r9, 0x5, 0x3, 0x80000000}, 0xfffffffffffffd70) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e22, 0x800, @mcast1, 0x58}}, 0x1f, 0x9, 0x8, 0xfffffffc, 0x20, 0x1, 0x80}, &(0x7f0000000180)=0x9c) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r10, @in={{0x2, 0x4e20, @empty}}}, 0x84) [ 850.305698] FAULT_INJECTION: forcing a failure. [ 850.305698] name failslab, interval 1, probability 0, space 0, times 0 [ 850.317334] CPU: 1 PID: 7560 Comm: syz-executor.4 Not tainted 4.14.160-syzkaller #0 [ 850.325222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.334696] Call Trace: [ 850.337298] dump_stack+0x142/0x197 [ 850.340941] should_fail.cold+0x10f/0x159 [ 850.345100] should_failslab+0xdb/0x130 [ 850.349075] kmem_cache_alloc_trace+0x2e9/0x790 [ 850.353759] ? trace_hardirqs_on+0x10/0x10 [ 850.358049] fuse_dev_do_write+0x9fb/0x2200 [ 850.362364] ? __might_fault+0x110/0x1d0 [ 850.366421] ? _parse_integer+0xe8/0x140 [ 850.370481] ? fuse_dev_read+0x1b0/0x1b0 [ 850.374537] ? trace_hardirqs_on+0x10/0x10 [ 850.378756] ? lock_downgrade+0x740/0x740 [ 850.382963] ? get_pid_task+0x98/0x140 [ 850.386852] ? __lock_acquire+0x5f7/0x4620 [ 850.391088] ? memset+0x32/0x40 [ 850.394368] fuse_dev_write+0x12e/0x1b0 [ 850.398326] ? fuse_dev_splice_write+0x9a0/0x9a0 [ 850.403422] ? trace_hardirqs_on+0x10/0x10 [ 850.407653] ? iov_iter_init+0xaf/0x1d0 [ 850.411624] __vfs_write+0x4a7/0x6b0 [ 850.415334] ? kernel_read+0x120/0x120 [ 850.419219] ? rw_verify_area+0xea/0x2b0 [ 850.423303] vfs_write+0x198/0x500 [ 850.426840] SyS_write+0xfd/0x230 [ 850.430285] ? SyS_read+0x230/0x230 [ 850.433927] ? do_syscall_64+0x53/0x640 [ 850.437897] ? SyS_read+0x230/0x230 [ 850.441518] do_syscall_64+0x1e8/0x640 [ 850.445399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 850.450241] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:14:23 executing program 4 (fault-call:3 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 850.455435] RIP: 0033:0x45a919 [ 850.458616] RSP: 002b:00007fb779440c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 850.466310] RAX: ffffffffffffffda RBX: 00007fb779440c90 RCX: 000000000045a919 [ 850.473578] RDX: 0000000000000034 RSI: 0000000020000000 RDI: 0000000000000003 [ 850.480845] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 850.488167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7794416d4 [ 850.495426] R13: 00000000004cb744 R14: 00000000004e51e8 R15: 0000000000000004 14:14:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESHEX=r0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x26, 0x3, 0x0, {0x0, 0x5, 0x0, 'fuse\x00'}}, 0x26) 14:14:23 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000004fc0)='/dev/input/mouse#\x00', 0x0, 0x1200) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000005000)=0x40, 0x4) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvram\x00', 0x248080, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000180)={0x7e, 0x0, 0x1, 0x7, 0x7}) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000001c0)=@ccm_128={{0x281}, "fb369afb2e1cc1ef", "d7040bcf130d26db11e8b8f90b29e979", "9c10695f", "2f0307ce05c7a1bf"}, 0x28) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000280)=0x157) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xfffffe6d}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000000c0)={r6, 0x1}, 0x8) 14:14:23 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) 14:14:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000040)={0x0, 0x2}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:23 executing program 1 (fault-call:7 fault-nth:1): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:23 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) [ 850.951171] FAULT_INJECTION: forcing a failure. [ 850.951171] name failslab, interval 1, probability 0, space 0, times 0 [ 850.965707] CPU: 0 PID: 7600 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 850.973616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.983243] Call Trace: [ 850.985834] dump_stack+0x142/0x197 [ 850.989472] should_fail.cold+0x10f/0x159 [ 850.993625] should_failslab+0xdb/0x130 [ 850.997589] __kmalloc+0x2f0/0x7a0 [ 851.001117] ? kmem_cache_alloc_trace+0x623/0x790 [ 851.006028] ? alloc_pipe_info+0x15c/0x380 [ 851.010318] alloc_pipe_info+0x15c/0x380 [ 851.014370] ? save_trace+0x290/0x290 [ 851.018172] splice_direct_to_actor+0x5d2/0x7b0 [ 851.022847] ? avc_policy_seqno+0x9/0x20 [ 851.026920] ? selinux_file_permission+0x85/0x480 [ 851.031771] ? generic_pipe_buf_nosteal+0x10/0x10 [ 851.036641] ? security_file_permission+0x89/0x1f0 [ 851.036655] ? do_splice_to+0x170/0x170 [ 851.045545] ? rw_verify_area+0xea/0x2b0 14:14:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:23 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYRESDEC, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYRES16=r3, @ANYRES64, @ANYRESDEC=r4, @ANYRES16=r5, @ANYBLOB="c62ce463921ccba907c7d3501034a7dda7a1194309e15c2834b7910deb1e171d2b059a0f572d06254241c6", @ANYPTR], @ANYRES64=r6, @ANYRES32, @ANYRES64, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32=r7, @ANYRESOCT=r1, @ANYPTR, @ANYRESOCT=r9, @ANYRESOCT=r8, @ANYRES64=r0, @ANYPTR]], @ANYBLOB="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", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="cd7ef1c7030000000000000010000000000000001e635809192eb7070000000000000013000000000000b5f619dbc30eacde982c6701749f0073656c667472757374656400b3e2e87216afc2184de245b0f26ff2b2c9b2a5f5483cffed3e3777bf36d26b1cd6f89b1d9a3c155b6ddaba66e20561eee3f91de4b274bf8e4b8e802196678db898e79981977f9ac707a8b58a99c8beecf707489f739cb9ea9e1db4881a"], 0x34) r10 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40000, 0xc8c439c5cef53b08) getpeername$ax25(r10, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet6_dccp_int(r10, 0x21, 0x6, &(0x7f0000000100)=0x1, 0x4) [ 851.049611] do_splice_direct+0x18d/0x230 [ 851.049624] ? splice_direct_to_actor+0x7b0/0x7b0 [ 851.049638] ? rw_verify_area+0xea/0x2b0 [ 851.049650] do_sendfile+0x4db/0xbd0 [ 851.049667] ? do_compat_pwritev64+0x140/0x140 [ 851.049680] ? fput+0xd4/0x150 [ 851.049691] SyS_sendfile64+0x102/0x110 [ 851.049701] ? SyS_sendfile+0x130/0x130 [ 851.049710] ? do_syscall_64+0x53/0x640 [ 851.049719] ? SyS_sendfile+0x130/0x130 [ 851.090378] do_syscall_64+0x1e8/0x640 [ 851.094273] ? trace_hardirqs_off_thunk+0x1a/0x1c 14:14:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3400000003000000000000000000604a1d2e00000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) [ 851.099140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 851.104332] RIP: 0033:0x45a919 [ 851.107521] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 851.115241] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 851.122515] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 851.129791] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 851.137061] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 851.137068] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) semget(0x1, 0x1, 0x400) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x40, 0x9) close(r0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0x1, 0x0, [], {0x0, @bt={0x2, 0x0, 0x1, 0x0, 0x4, 0x6, 0xffffffcc, 0x0, 0x80000001, 0xfff, 0xda2e, 0x800, 0x516194e8, 0x1e3e, 0x2, 0x8, {0x20, 0x8}, 0x81, 0xff}}}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$sock_netdev_private(r4, 0x8a00, &(0x7f00000009c0)="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") 14:14:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0xf6, 0x3, 0x0, {0x0, 0x13, 0x0, 'fuse\x00'}}, 0x34) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x8001, 0x0, r2}}}, 0x28) r3 = getpid() r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$selinux_user(r4, &(0x7f0000000040)={'system_u:object_r:urandom_device_t:s0', 0x20, 'unconfined_u\x00'}, 0x33) ptrace$setopts(0xffffffffffffffff, r3, 0xffffffffffffff47, 0x0) 14:14:23 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000002c0), 0x4) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000680)={0x7, @pix={0x7, 0x1, 0x30314752, 0xdb272ee234f3c6a5, 0x8, 0x1, 0x0, 0x7, 0x1, 0x0, 0x0, 0x5}}) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000040)={0x38, {{0x2, 0x4e20, @multicast1}}, 0x1, 0x3, [{{0x2, 0x4e24, @rand_addr=0x2}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e24, @broadcast}}]}, 0x210) getsockopt$inet_buf(r1, 0x0, 0x27, 0x0, &(0x7f0000000000)) 14:14:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r8, 0xc0a85320, &(0x7f0000000680)={{0xed, 0x20}, 'port1\x00', 0x40, 0x4, 0xfff, 0x5f3, 0x5, 0x4, 0x6, 0x0, 0x7, 0x1}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000040)=0x6, 0x4) 14:14:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES16]) flock(r0, 0x4fa639ba03cb565) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:24 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, 0x0, 0x0) 14:14:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="340000000300000000000000000000000000000000b2977832874eff000000006b657972696e672c73656c667472757374656400"], 0x34) 14:14:24 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:24 executing program 1 (fault-call:7 fault-nth:2): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) [ 851.761447] FAULT_INJECTION: forcing a failure. [ 851.761447] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 851.774225] CPU: 1 PID: 7649 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 851.782030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.791497] Call Trace: [ 851.794090] dump_stack+0x142/0x197 [ 851.797713] should_fail.cold+0x10f/0x159 [ 851.801862] ? __might_sleep+0x93/0xb0 [ 851.805743] __alloc_pages_nodemask+0x1d6/0x7a0 [ 851.810402] ? __alloc_pages_slowpath+0x2930/0x2930 [ 851.815403] ? lock_downgrade+0x740/0x740 [ 851.819546] alloc_pages_vma+0xc9/0x4c0 [ 851.823512] shmem_alloc_page+0xf6/0x1a0 [ 851.827798] ? shmem_swapin+0x1a0/0x1a0 [ 851.831771] ? cred_has_capability+0x142/0x290 [ 851.836412] ? find_held_lock+0x35/0x130 [ 851.840472] ? check_preemption_disabled+0x3c/0x250 [ 851.845482] ? __this_cpu_preempt_check+0x1d/0x30 [ 851.850314] ? percpu_counter_add_batch+0x112/0x160 [ 851.855381] ? __vm_enough_memory+0x26a/0x490 [ 851.860035] shmem_alloc_and_acct_page+0x12a/0x680 [ 851.864963] shmem_getpage_gfp+0x3e7/0x2870 [ 851.869280] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 851.874278] ? avc_has_perm_noaudit+0x420/0x420 [ 851.878930] shmem_file_read_iter+0x49e/0xb20 [ 851.883427] ? shmem_writepage+0xc80/0xc80 [ 851.887670] ? iov_iter_pipe+0x9f/0x2c0 [ 851.891680] generic_file_splice_read+0x37d/0x600 [ 851.896681] ? fsnotify+0x11e0/0x11e0 [ 851.901210] ? add_to_pipe+0x340/0x340 [ 851.905097] ? rw_verify_area+0xea/0x2b0 [ 851.909146] ? add_to_pipe+0x340/0x340 [ 851.913034] do_splice_to+0x105/0x170 [ 851.916831] splice_direct_to_actor+0x222/0x7b0 [ 851.921499] ? generic_pipe_buf_nosteal+0x10/0x10 [ 851.926591] ? do_splice_to+0x170/0x170 [ 851.930549] ? rw_verify_area+0xea/0x2b0 [ 851.934596] do_splice_direct+0x18d/0x230 [ 851.938743] ? splice_direct_to_actor+0x7b0/0x7b0 [ 851.943585] ? rw_verify_area+0xea/0x2b0 [ 851.947640] do_sendfile+0x4db/0xbd0 [ 851.951351] ? do_compat_pwritev64+0x140/0x140 [ 851.955926] ? fput+0xd4/0x150 [ 851.959102] SyS_sendfile64+0x102/0x110 [ 851.963061] ? SyS_sendfile+0x130/0x130 [ 851.967024] ? do_syscall_64+0x53/0x640 [ 851.970997] ? SyS_sendfile+0x130/0x130 [ 851.974979] do_syscall_64+0x1e8/0x640 [ 851.978876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 851.983714] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 851.988972] RIP: 0033:0x45a919 [ 851.992146] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 851.999860] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 14:14:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:24 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x8080) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)=ANY=[@ANYBLOB="38010000100013075700000000000000fe80000000000000000016c6c7b297300000000000000500000000000000000000000001000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) sendmmsg$inet6(r2, &(0x7f0000002600)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x9, @ipv4={[], [], @multicast1}}, 0x1c, &(0x7f0000000280), 0x0, &(0x7f0000000500)=[@hopopts={{0x28, 0x29, 0x36, {0x5e, 0x2, [], [@enc_lim={0x4, 0x1, 0xf1}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @ra={0x5, 0x2, 0x9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @hopopts={{0x70, 0x29, 0x36, {0x0, 0xa, [], [@calipso={0x7, 0x40, {0x6, 0xe, 0x3, 0x9, [0x80000001, 0xffff, 0x8, 0xc6e3, 0xffff, 0xfff, 0xa4e]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x400}, @enc_lim={0x4, 0x1, 0xfd}, @ra={0x5, 0x2, 0xf84}]}}}], 0xb0}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty, 0xd515}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)}, {&(0x7f0000000400)="91e68e343f0f451270a711c3b4df8201cf", 0x11}], 0x2, &(0x7f0000000600)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x13, 0xa, 0x2, 0xfb, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="8e4881cc91cbe8d18afba0440b1a8264", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}], 0x68}}, {{&(0x7f0000000680)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x471daff8}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000d80)="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", 0x1000}, {&(0x7f0000000740)}, {&(0x7f0000000840)="6a450ae7929013d2a8ec72a23e9751a82b0565ae7288065ddec49ea252bd384c9e26c1f12dc0cd9709691bf6c087602330c4cdd47b7690f399a92f6dcf46ca3a0364f79ab267ccff85e7b709d5fa081835e9834969ede28b4929d4f8c153214d992edbbbf1f3077ff792d1f2afde70199c8a28d9c3b85e9188dd9494902ba1fd20487acd0c0b38d5af84804a39b0d7d2b54e439dd2b17d0460dcbf63b35c5c629ee2477d402770f9b727294578bec05eab9d31c4f9", 0xb5}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="08010000000000002900000036000000001d000000000000040100c2040000000405020000050200853fd643c06995082dcf5c60016185f3aab247e5addbc14945046d32dc839e46308be4346b91b8f2540db9f7cdc897958b224a5210f646c7177ae60a4516344576c24ca7a37a7a3e45ae9bb2b76c7e53be79be8b9c74d43480aa39470b2b7017024223a4dd4406441e474d279bfe8113b5a91918b39d248207c6b10dd1c1e49e1f4b23799e3caece728c3c7e2ae9c446fe151f31f68ca3a26bdb9af630dbf0d352e9a32c088ccc6a9a9e640e20dff36aff16f75ad61a304f14bce4225fa37cf000218bbcfa699a5d6edd0ee24f53de09000000001a1b5d000000000000001400000000000000290000000b0000000000e492000000002000000000000000290000003600000006000000000000000401050000000000480000000000000029000000390000000206020b7a802700fe880000000000000000000000000101fe8000000000000000000000000000bb00000000000000000000ffffac1414bb1400290000000800000009000000000000001400000000000000290000000800000001040000000000002400000000000000290000003200"/463, @ANYRES32=r3, @ANYBLOB], 0x1d3}}, {{&(0x7f0000000d00)={0xa, 0x4e20, 0x0, @remote, 0xefdd}, 0x1c, &(0x7f0000001f40)=[{&(0x7f0000001d80)}, {0x0}, {&(0x7f0000001e80)="95625d6469be24556962472f7ce3b4b4b5ba763e3c6e1aa3598bf4e47182226d9b20fafb", 0x24}, {&(0x7f0000001ec0)="b9c71c3a0ea94bef2f823d9fba571b98a1bdbcc6c66ae89f424fe5930fc447210132141403973da6bd588c17a5cf0ec42553a3987488a4d181764ea2", 0x3c}], 0x4}}, {{&(0x7f0000001f80)={0xa, 0x4e24, 0x9, @empty}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000001fc0)="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", 0xff}, {&(0x7f0000002140)="a2e5917bc44da94b877617b83143cbc459f8682c07c0a2f04754fbc484e9f3cca6a669e7566a736d4ae2ee6c5aa011fb132bcc4c3e01d8128b91a95f2226db2e504e59947639c2a3ce9a23e9f747ecc6ae6b638fc24c9a5f0a01a54970978252f83b7da5d4e1797cb01b2fe1a881a9ed1a178927dd73c57077ca97ecb6035c5afceb7ccf72f56dbd4679d41f791727d126e972d63312b94d369b479cc86ee9ea02f75dbdb7", 0xa5}, {&(0x7f0000002200)="fcbe725b50f65d8d221f46273250e582805e53680f257beeca3e212a05546030339136660dd901bedbca1f545d736dee45a2791441495fd557eadc08e99e544d23f2805ca9d853e4ac99b0d23ca619b4aaa10a91c6a57cd2fdce6ea31eedbcd9d51f765f60a74f76e89dd0880197", 0x6e}, {0x0}, {&(0x7f0000002380)="45db0f5ce8fb4319412fd49d64f1c19ee85a3eb8af73f66ffad07199", 0x1c}], 0x5, &(0x7f0000002580)=[@hopopts={{0x40, 0x29, 0x36, {0xa0, 0x4, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x81, 0x0}}, @hao={0xc9, 0x10, @loopback}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x12}}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}], 0x80}}], 0x5, 0x40000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000380)=0xe8) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r6, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="08006b00040000000c0050000100000000000000f40078007ce9243ed67c0a1d31c213ba49df3fec62273d66e61436719d381e6cf949dabce56550f1aca55a0b9f95fa65f7cf57ca69d5bfa79773e0006660e968d79079eb226f0023745b0eaebb445e1c4726aa3928df7eb95fdda596f703017b74e0d02e67749f016ff4752315891ac6cbd9dc37bdf6cbc07aa298695bb52adbebb8584e358703c8101c158a384d8d80dc632e91a22bab49d88c1574e7e5cd5b373cb01292977523862c03aebb379a3d631741898560e44af88ca7fcfddc5cfb64387e2e2547de089bb1d2d253ecf46f37928e05f5e74bd7e0c9ea5e98d2696bfd5923dfa0f3b9463b3d45980cca45186d1d00000800", @ANYRES32=r9], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) sendmsg$nl_xfrm(r1, &(0x7f0000000800)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x180010}, 0xc, &(0x7f00000007c0)={&(0x7f0000000500)=@polexpire={0x294, 0x1b, 0x200, 0x70bd2d, 0x25dfdbff, {{{@in6=@local, @in6=@ipv4={[], [], @rand_addr=0x2}, 0x4e22, 0x92, 0x4e20, 0x0, 0xa, 0x10, 0x30, 0x2f, r3, r4}, {0x1, 0x4, 0x80, 0x0, 0x5, 0x6, 0x6, 0xb7e}, {0x0, 0x9, 0x7fffffff, 0xffffffff7fffffff}, 0x6, 0x6e6bb2, 0x1, 0x0, 0x2, 0x1}, 0x1f}, [@replay_val={0x10, 0xa, {0x70bd26, 0x70bd2b, 0x1}}, @replay_val={0x10, 0xa, {0x70bd28, 0x70bd28, 0x3f}}, @sa={0xe4, 0x6, {{@in6=@rand_addr="63ddc7c582cc78e6534d3eb5bbdda214", @in6=@local, 0x4e24, 0xa7, 0x4e22, 0x1, 0x2, 0x1417ec8ca6fb4f11, 0xe0, 0x102, r5, r8}, {@in6=@local, 0x4d5, 0x6ff611921a4e9125}, @in=@dev={0xac, 0x14, 0x14, 0x19}, {0x8, 0x800, 0xffffffffffff7fff, 0x7, 0xbb, 0xfffffffffffff001, 0x1, 0x30}, {0x8000, 0x1, 0x9e6a, 0x8001}, {0x80000001, 0xffff, 0xff0000}, 0x70bd26, 0x3506, 0xb, 0x0, 0x81, 0x80}}, @proto={0x8, 0x19, 0xebb0403375afc60b}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd25, 0x70bd26, 0x70bd26, 0x91, [0x3ff, 0x2, 0xffff0001, 0x6, 0x4, 0xfffffff8]}}, @extra_flags={0x8, 0x18, 0x8}, @algo_auth_trunc={0x8c, 0x14, {{'nhpoly1305-avx2\x00'}, 0x200, 0x100, "1902eee7a4d80c8e2c488f760a726f4d8bc6689ccbd9a000094ecbc6f684f175bd2f98dfde86ce236bdd3a73605006e8e58882319fdd29e57895b84910fd82f5"}}]}, 0x294}, 0x1, 0x0, 0x0, 0x964c24b12248b3fd}, 0x10) ioctl$FBIOBLANK(r0, 0x4611, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x900, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESOCT]) write$FUSE_NOTIFY_INVAL_ENTRY(r10, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 852.007120] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 852.014378] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 852.021638] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 852.028919] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:24 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x111200) getsockopt$inet_buf(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)=0x1013b) 14:14:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000040)={0xe962}) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x9e0000, 0xfffffeff, 0xb01, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xa30901, 0x8, [], @p_u32=&(0x7f0000000040)}}) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000100)) 14:14:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="795b8327de91fd2c02030000000000003d", @ANYRESDEC=0x0]) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000180)=0xffffffff, 0x4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@bcast, @netrom, @rose, @rose, @default, @rose, @default, @bcast]}, &(0x7f0000000100)=0x48) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x34) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000300)=""/175) dup(r1) 14:14:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000080)=""/21, 0x3}) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) fcntl$notify(r1, 0x402, 0x4) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2b, 0x0, &(0x7f0000000000)) 14:14:25 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, 0x0, 0x0) 14:14:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setns(r1, 0x2a010000) 14:14:25 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket$inet_sctp(0x2, 0x1, 0x84) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="34000000030000000000000000000000000000000000000013000000080000b9d1e18202f218b8e946006b657972696e672c73656c66747275737465640034b5d6130aa8eafaa321763f5d764a6c57a55842bc185f9c00000000000000000000457756e0910f07d0e2ff2c6a87112643852d5d8804cdbeba2295cfced195802c2c5af037ebc5d60c73b0d3ba64cb7b3c6edaf3"], 0x34) 14:14:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:25 executing program 1 (fault-call:7 fault-nth:3): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 14:14:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) 14:14:25 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="726177940001b000000000000000000000000000000000000000000000000000020000000300000048020000000000000000000000000000e0000000e0000000b0010000b0010000b0010000b0010000b0010000030000000000000000000000ffffffffac1e000100703000000000000065716c00bc0000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e0000000000000000000000000000000000000000000280065636e000000000000000000000000000000000000000000000000000000d8000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d0000000000000000000000000000000000000000000600001000000000000ed4f00002fbc473400000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"/680], 0x2a8) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)) 14:14:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = gettid() ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000140)={&(0x7f0000000100)=""/49, 0x31}) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x80, 0x400}]}, 0xc, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f00000000c0)={{0x2, 0x0, @reserved="8bbad3076fd57d916708ad0aa4f6dd83fd2540785b5f98ea178f3cc1c72109ca"}}) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) write$FUSE_IOCTL(r3, &(0x7f0000000200)={0x20, 0x0, 0x4, {0xc2, 0x0, 0x4, 0xffff}}, 0x20) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r3, 0xc06c4124, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 852.974989] FAULT_INJECTION: forcing a failure. [ 852.974989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:14:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="0000020000", @ANYRES16=0x0, @ANYBLOB="000025bd7000fbdbdf25020000000c000800feffffffffffffff08000100000000000c00060005000000000000000c00040003000000000000000c0008000000000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x804}, 0x8000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="66643dc3dd6eef5e7d89d22499f6b712741bcd0148f11268cd0c0c1b4d53fe66fa49b5fee7a1ad32cc91e1d5d9a078ac5f856de8cfc27f83922f91d1f13bb099617f303a35d156b03afc697cb1a377f3f7774b5bd79a342c2f5ba84d766716c8f142e382395a49be43c566e84b18fd8f30ca85459b28b7518b0245aca902ed92eb4bdd46400ed94c05eb3eeee5380b51741d9d06998f45ec712d6b7f5f16", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x101001) r2 = socket(0x10, 0x803, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0xff72) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f0000000500)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) r4 = socket(0x2000000000000010, 0x3, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000840)=""/223, &(0x7f0000000380)=0xdf) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r5, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r5, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1024}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="ec000000", @ANYRES16=r5, @ANYBLOB="000227bd7000ffdbdf250b000000080005000300000044000100080009007600000014000300fe8000000000000000000000000000bb0c000700440000001000000008000600776c6300080005000600000008000b00736970001800030014000600ff02000000000000000000000000000160000100080004004e210000080006007365640008000200db000000080004004e2400000800050004000000080001000a00000008000b007369700008000500030000001400030000000000000000000000000000000001080008000300000014000100080004004e230000080005000100000068474b082586d1c676874f808d1acc35fcde3ebf"], 0xec}, 0x1, 0x0, 0x0, 0x676118b9a20bdcb2}, 0x4044040) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 853.024574] CPU: 0 PID: 7723 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 853.032418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.041784] Call Trace: [ 853.044408] dump_stack+0x142/0x197 [ 853.048062] should_fail.cold+0x10f/0x159 [ 853.052222] ? __might_sleep+0x93/0xb0 [ 853.056123] __alloc_pages_nodemask+0x1d6/0x7a0 [ 853.060823] ? __alloc_pages_slowpath+0x2930/0x2930 [ 853.065853] ? lock_downgrade+0x740/0x740 [ 853.070021] alloc_pages_vma+0xc9/0x4c0 14:14:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, 0x0, &(0x7f0000000000)=0xffffffffffffffc5) [ 853.074008] shmem_alloc_page+0xf6/0x1a0 [ 853.078072] ? shmem_swapin+0x1a0/0x1a0 [ 853.082057] ? cred_has_capability+0x142/0x290 [ 853.086639] ? find_held_lock+0x35/0x130 [ 853.090693] ? check_preemption_disabled+0x3c/0x250 [ 853.095722] ? __this_cpu_preempt_check+0x1d/0x30 [ 853.100578] ? percpu_counter_add_batch+0x112/0x160 [ 853.105603] ? __vm_enough_memory+0x26a/0x490 [ 853.110117] shmem_alloc_and_acct_page+0x12a/0x680 [ 853.115059] shmem_getpage_gfp+0x3e7/0x2870 [ 853.119397] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 853.124425] shmem_file_read_iter+0x49e/0xb20 [ 853.128950] ? shmem_writepage+0xc80/0xc80 [ 853.133174] ? iov_iter_pipe+0x9f/0x2c0 [ 853.137250] generic_file_splice_read+0x37d/0x600 [ 853.142150] ? fsnotify+0x11e0/0x11e0 [ 853.145941] ? add_to_pipe+0x340/0x340 [ 853.149820] ? rw_verify_area+0xea/0x2b0 [ 853.153890] ? add_to_pipe+0x340/0x340 [ 853.157776] do_splice_to+0x105/0x170 [ 853.161564] splice_direct_to_actor+0x222/0x7b0 [ 853.166407] ? generic_pipe_buf_nosteal+0x10/0x10 [ 853.171242] ? do_splice_to+0x170/0x170 [ 853.175226] ? rw_verify_area+0xea/0x2b0 [ 853.179284] do_splice_direct+0x18d/0x230 [ 853.183421] ? splice_direct_to_actor+0x7b0/0x7b0 [ 853.188478] ? rw_verify_area+0xea/0x2b0 [ 853.190112] net_ratelimit: 14 callbacks suppressed [ 853.190117] protocol 88fb is buggy, dev hsr_slave_0 [ 853.192653] do_sendfile+0x4db/0xbd0 [ 853.192672] ? do_compat_pwritev64+0x140/0x140 [ 853.192686] ? fput+0xd4/0x150 [ 853.192697] SyS_sendfile64+0x102/0x110 [ 853.192707] ? SyS_sendfile+0x130/0x130 [ 853.192717] ? do_syscall_64+0x53/0x640 [ 853.192726] ? SyS_sendfile+0x130/0x130 [ 853.192737] do_syscall_64+0x1e8/0x640 [ 853.197716] protocol 88fb is buggy, dev hsr_slave_1 [ 853.202657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 853.202675] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 853.202683] RIP: 0033:0x45a919 [ 853.202687] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 853.202697] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 853.202702] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 853.202707] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 853.202715] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 853.290875] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:26 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, 0x0, 0x0) 14:14:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) getpeername$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) 14:14:26 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:26 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="34000000030000000000000000000000000000000000d239d7ba418ccabd0944ec75000013003ed16ed9ca370000000000006b657972696e672c73656c667472757374656400"], 0x34) [ 853.510145] protocol 88fb is buggy, dev hsr_slave_0 [ 853.515297] protocol 88fb is buggy, dev hsr_slave_1 [ 853.520462] protocol 88fb is buggy, dev hsr_slave_0 [ 853.525534] protocol 88fb is buggy, dev hsr_slave_1 14:14:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r2 = accept4$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x80000) sendmsg$tipc(r2, &(0x7f0000000200)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000140)="c5200b2ddded66124c203bcab17d7c7851462bad59037a4acdac3ff8de780ec0a90e5d5016b77b5b28e5f45cd8746dc7bd866de57d076f82f33ecff75d6e1ab52d32462d3852dd1a183eac821e3a2a2467fdb9fd0029b7843bf6ae2ce6780652398e90aa", 0x64}], 0x1, 0x0, 0x0, 0x8080}, 0x40015) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x2, 0x4849b9505a99a4e0, 0x5, 0x5, 0x9, 0x3, 0x7}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:26 executing program 1 (fault-call:7 fault-nth:4): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 14:14:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r0, 0xc06c4124, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000040)={0x6c, @dev={0xac, 0x14, 0x14, 0x15}, 0x4e24, 0x0, 'sh\x00', 0x8, 0x6, 0x1000071}, 0x2c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$TCGETS(r4, 0x5401, &(0x7f00000001c0)) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000180)={0x3}) r5 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x3, 0x8000) ioctl$SNDRV_PCM_IOCTL_PREPARE(r5, 0x4140, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000000c0)=0x6) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) [ 853.822494] IPVS: set_ctl: invalid protocol: 108 172.20.20.21:20004 [ 853.825329] FAULT_INJECTION: forcing a failure. [ 853.825329] name failslab, interval 1, probability 0, space 0, times 0 [ 853.836158] IPVS: set_ctl: invalid protocol: 108 172.20.20.21:20004 [ 853.840427] CPU: 0 PID: 7775 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 853.840435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.840439] Call Trace: [ 853.840459] dump_stack+0x142/0x197 [ 853.840474] should_fail.cold+0x10f/0x159 [ 853.840490] should_failslab+0xdb/0x130 [ 853.840498] kmem_cache_alloc+0x47/0x780 [ 853.840509] ? __lock_acquire+0x5f7/0x4620 [ 853.840522] ? __alloc_pages_nodemask+0x639/0x7a0 [ 853.892113] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 853.897781] radix_tree_extend+0x208/0x430 [ 853.902035] __radix_tree_create+0x3c9/0x4d0 [ 853.906473] __radix_tree_insert+0xab/0x570 [ 853.910795] ? __radix_tree_create+0x4d0/0x4d0 [ 853.915374] shmem_add_to_page_cache+0x5a4/0x860 [ 853.920122] ? shmem_unused_huge_scan+0xa0/0xa0 [ 853.924787] ? __radix_tree_preload+0x1d2/0x260 [ 853.929452] shmem_getpage_gfp+0x17cc/0x2870 [ 853.933862] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 853.938866] shmem_file_read_iter+0x49e/0xb20 [ 853.943371] ? shmem_writepage+0xc80/0xc80 [ 853.947604] ? iov_iter_pipe+0x9f/0x2c0 [ 853.951569] generic_file_splice_read+0x37d/0x600 [ 853.956484] ? fsnotify+0x11e0/0x11e0 [ 853.960274] ? add_to_pipe+0x340/0x340 [ 853.964149] ? rw_verify_area+0xea/0x2b0 [ 853.968208] ? add_to_pipe+0x340/0x340 [ 853.972088] do_splice_to+0x105/0x170 [ 853.975875] splice_direct_to_actor+0x222/0x7b0 [ 853.980530] ? generic_pipe_buf_nosteal+0x10/0x10 [ 853.985355] ? do_splice_to+0x170/0x170 [ 853.989309] ? rw_verify_area+0xea/0x2b0 [ 853.993355] do_splice_direct+0x18d/0x230 [ 853.997509] ? splice_direct_to_actor+0x7b0/0x7b0 [ 854.002354] ? rw_verify_area+0xea/0x2b0 [ 854.006410] do_sendfile+0x4db/0xbd0 [ 854.010126] ? do_compat_pwritev64+0x140/0x140 [ 854.014701] ? fput+0xd4/0x150 [ 854.017879] SyS_sendfile64+0x102/0x110 [ 854.021992] ? SyS_sendfile+0x130/0x130 [ 854.025965] ? do_syscall_64+0x53/0x640 [ 854.029933] ? SyS_sendfile+0x130/0x130 [ 854.033906] do_syscall_64+0x1e8/0x640 [ 854.037787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 854.042635] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 854.047803] RIP: 0033:0x45a919 [ 854.050980] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 854.058861] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 854.066121] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 14:14:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'rmd128\x00'}}) keyctl$setperm(0x5, r1, 0x20000000) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10000, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x400, 0x0) sendto(r4, &(0x7f0000000300)="c4e833b53a19b202805ec6d5077daffac980613e4a092922bd53625626e7013b917ebfa04eca2c56acd2934b6cb88881c41a2cc1fb0a3e71485722cca20f41733769d540a63e9556fae3845455d03e8e83aa0d597b2326a70794ca250af1b26a34a1c4da09315754284570f87ae293b95b7d3fcd7d814f39dc63de6224ef3fc0b608ba35bc36d62c9b7113ddf378ff7db42f3ce05d9a6880e8d68dd6f2eab51a2de991de30f0a955a2ee99766b835c9ad6e63e794348e55b02c5d6fdc74047d5", 0xc0, 0x20, &(0x7f0000000400)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}, 0x80) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0xc, 0x9, "54996113f258dc5b8e34a8237f61696fae430ed769d183b3edb8049fdf0840d9f591064f30bbfee245a9bd81109c0fbedb5f7940cc169eb3ace53fdb206f9555", "c5ec4d2fc6fb7d7e985217ba5b0d2bfe560831e4e535184bfa15f0a5a2f2e90471b8d110afc2f27d751bf0014fceb833882ef1e5a00dfcc3810fbf6d55413c20", "c5b3a5731731276983ccbe5a3cf0bd13f0d06599b99421f9553c7acb1d8f107e", [0x5, 0x4]}) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0x673c47543236a1f) [ 854.073379] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 854.080640] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 854.087893] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 [ 854.095564] protocol 88fb is buggy, dev hsr_slave_0 [ 854.100740] protocol 88fb is buggy, dev hsr_slave_1 [ 854.105906] protocol 88fb is buggy, dev hsr_slave_0 [ 854.111029] protocol 88fb is buggy, dev hsr_slave_1 14:14:26 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x20000, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)={0x4000000000000182, [0x0, 0x0]}) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:26 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "6ae9d9637cf7c5842c067ef261a2a5c655b5c6360e9743c1ab2a16c4a72372253dddf2173c58ab35dbf8db9e22cc122a3f33d087b3c124fbae9b451f37e433f84feef3787127734a6fde7d344bd2fc403b57dc9b7f51803590f87121a2ee617e29133cb5fc5bad50571e20017b22ef642a91"}, 0x76) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:26 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:26 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1000, 0x100000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x9, @ipv4={[], [], @broadcast}}}, [0xb55, 0x5, 0x800, 0x1, 0x76, 0x6, 0x40000000, 0x4, 0x5, 0x4, 0xffffffffffffff9f, 0x8, 0x7, 0x0, 0x10000]}, &(0x7f0000000200)=0x100) ioctl$SIOCNRDECOBS(r0, 0x89e2) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1}, 0x8) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r3, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:27 executing program 1 (fault-call:7 fault-nth:5): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:27 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000340)={0xffff, 0xfffffffc, 0x8, {0x6, 0x9}, 0x6, 0x7a}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303020000000302c757365725f69643d840d20c5dc402ad00c40d2fa4cb34a465cc7d696aa301fdbed91f06d09593e47d6165413889cbd21fee85c14b12dfa9ab8b53b51e85d85919b875f29325af3d261ff997201d2a9a8e95962e53109dce8c7e1916f14de21e9aa21a2", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r2, 0xa) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), 0xdb38b8723c5bd9c8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x8000, 0x2) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000300)=0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x22) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r5 = accept4$ax25(r4, 0x0, &(0x7f0000000000), 0x0) ioctl$SIOCAX25GETINFOOLD(r5, 0x89e9, &(0x7f0000000040)) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xd6) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r3, @ANYRES32=0x0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="340000000300a44fe48665cdfe5c014015801559149000000000000000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000100)={'ip6gretap0\x00', &(0x7f0000000680)=@ethtool_drvinfo={0x3, "58db12444df95a1838daec61404274075b2d8822fcfdcd5b47df6b11c8f46410", "47620c73b187d9b73a79d0671680d8c3ab9d18e1d012e1e93ad67dff4df427c1", "e2abae59d41ee4d9269e7c86899e783e249b4862d84c4e056329e04916bba57c", "d248f5745383cad996cf6d4e1f24b3482c40f8e79b0cd8bef603855d1a810671", "20b2a17197dda60494cbf83417bbdfd82aca5c125b91f0433cd50c3b30ffa925", "9a5139c67fcc5489611858dc", 0x9, 0x6, 0x2, 0x2, 0x7ff}}) [ 854.694875] FAULT_INJECTION: forcing a failure. [ 854.694875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 854.712791] CPU: 0 PID: 7822 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 854.720624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.729985] Call Trace: [ 854.732591] dump_stack+0x142/0x197 [ 854.736245] should_fail.cold+0x10f/0x159 [ 854.740421] ? __might_sleep+0x93/0xb0 14:14:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) [ 854.744326] __alloc_pages_nodemask+0x1d6/0x7a0 [ 854.749000] ? __alloc_pages_slowpath+0x2930/0x2930 [ 854.754110] ? lock_downgrade+0x740/0x740 [ 854.758281] alloc_pages_vma+0xc9/0x4c0 [ 854.762355] shmem_alloc_page+0xf6/0x1a0 [ 854.766420] ? shmem_swapin+0x1a0/0x1a0 [ 854.770406] ? cred_has_capability+0x142/0x290 [ 854.775000] ? find_held_lock+0x35/0x130 [ 854.779084] ? check_preemption_disabled+0x3c/0x250 [ 854.784109] ? __this_cpu_preempt_check+0x1d/0x30 [ 854.788946] ? percpu_counter_add_batch+0x112/0x160 [ 854.793968] ? __vm_enough_memory+0x26a/0x490 [ 854.798474] shmem_alloc_and_acct_page+0x12a/0x680 [ 854.803405] shmem_getpage_gfp+0x3e7/0x2870 [ 854.803424] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 854.803438] shmem_file_read_iter+0x49e/0xb20 [ 854.803456] ? shmem_writepage+0xc80/0xc80 [ 854.803465] ? iov_iter_pipe+0x9f/0x2c0 [ 854.803479] generic_file_splice_read+0x37d/0x600 [ 854.803487] ? fsnotify+0x11e0/0x11e0 [ 854.803498] ? add_to_pipe+0x340/0x340 [ 854.838031] ? rw_verify_area+0xea/0x2b0 [ 854.842109] ? add_to_pipe+0x340/0x340 [ 854.846016] do_splice_to+0x105/0x170 [ 854.849831] splice_direct_to_actor+0x222/0x7b0 [ 854.854513] ? generic_pipe_buf_nosteal+0x10/0x10 [ 854.859479] ? do_splice_to+0x170/0x170 [ 854.859493] ? rw_verify_area+0xea/0x2b0 [ 854.859506] do_splice_direct+0x18d/0x230 [ 854.859519] ? splice_direct_to_actor+0x7b0/0x7b0 [ 854.859533] ? rw_verify_area+0xea/0x2b0 [ 854.859545] do_sendfile+0x4db/0xbd0 [ 854.859562] ? do_compat_pwritev64+0x140/0x140 [ 854.859575] ? fput+0xd4/0x150 [ 854.859586] SyS_sendfile64+0x102/0x110 [ 854.859597] ? SyS_sendfile+0x130/0x130 [ 854.859606] ? do_syscall_64+0x53/0x640 [ 854.859613] ? SyS_sendfile+0x130/0x130 [ 854.859622] do_syscall_64+0x1e8/0x640 [ 854.867844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 854.867864] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 854.867872] RIP: 0033:0x45a919 [ 854.867878] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 854.867890] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 14:14:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x101000, 0x0) ioctl$BLKFRASET(r4, 0x1264, &(0x7f0000000700)=0x101) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_REQBUFS(r6, 0xc0145608, &(0x7f0000000380)={0x9a9, 0xc, 0x4}) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677b6f75705f69643d2ea38e95058897291f2920988e1b6bfa1020d909daff20724be1a6707dfa6185a3de7135a8101a45f2a6415474d60c03b622c3b7dca273be1d4c8091fbd9bfb478acd2fc9f583adb945978125cf89d783e48a5bd538778a32836ffdea1589e8d98134f76b64d1f0daaaad06396caf3dc1246208c8cffd5779bdbca2ca25aadcb76b3bf1e29b90a1c6a3c919a138bc0c5", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES64, @ANYBLOB="bbebb2e7113d53af", @ANYBLOB, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r5], @ANYRESOCT=r8], @ANYRESHEX, @ANYRESOCT=r3]]) r9 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x200000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r9, 0x84, 0x7, &(0x7f0000000080)={0x5}, 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 854.867896] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 854.867901] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 854.867907] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 854.867913] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x2, 0x4849b9505a99a4e0, 0x5, 0x5, 0x9, 0x3, 0x7}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:27 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r2, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:27 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x2a8) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0x4001, 0x2}, 0xc) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r2 = shmget(0x1, 0x4000, 0x200, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_LOCK(r2, 0xb) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000000c0)={0x1f, 0xcf0a, 0xffffffff, 0x100, 0x10, "849df53004a66fc8198f9688b4269e422a1b5c"}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfffffffffffffe83) 14:14:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4104, 0x0) r2 = socket(0x1e, 0x2, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r4, 0x5}, 0x14) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r4}, 0x8) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:28 executing program 1 (fault-call:7 fault-nth:6): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x0) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 855.524194] FAULT_INJECTION: forcing a failure. [ 855.524194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 855.539915] CPU: 0 PID: 7865 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 855.547730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.547736] Call Trace: [ 855.547755] dump_stack+0x142/0x197 [ 855.547775] should_fail.cold+0x10f/0x159 [ 855.547787] ? __might_sleep+0x93/0xb0 [ 855.547803] __alloc_pages_nodemask+0x1d6/0x7a0 [ 855.547817] ? __alloc_pages_slowpath+0x2930/0x2930 [ 855.581067] ? lock_downgrade+0x740/0x740 [ 855.585245] alloc_pages_vma+0xc9/0x4c0 [ 855.589240] shmem_alloc_page+0xf6/0x1a0 [ 855.593393] ? shmem_swapin+0x1a0/0x1a0 [ 855.597376] ? cred_has_capability+0x142/0x290 [ 855.601960] ? find_held_lock+0x35/0x130 [ 855.601973] ? check_preemption_disabled+0x3c/0x250 [ 855.601986] ? __this_cpu_preempt_check+0x1d/0x30 [ 855.601999] ? percpu_counter_add_batch+0x112/0x160 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 855.602014] ? __vm_enough_memory+0x26a/0x490 [ 855.602032] shmem_alloc_and_acct_page+0x12a/0x680 [ 855.602049] shmem_getpage_gfp+0x3e7/0x2870 [ 855.612078] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 855.612093] shmem_file_read_iter+0x49e/0xb20 [ 855.612112] ? shmem_writepage+0xc80/0xc80 [ 855.612120] ? iov_iter_pipe+0x9f/0x2c0 [ 855.612138] generic_file_splice_read+0x37d/0x600 [ 855.658217] ? fsnotify+0x11e0/0x11e0 [ 855.662035] ? add_to_pipe+0x340/0x340 [ 855.666051] ? rw_verify_area+0xea/0x2b0 [ 855.670119] ? add_to_pipe+0x340/0x340 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 855.674017] do_splice_to+0x105/0x170 [ 855.677830] splice_direct_to_actor+0x222/0x7b0 [ 855.682503] ? generic_pipe_buf_nosteal+0x10/0x10 [ 855.682518] ? do_splice_to+0x170/0x170 [ 855.682529] ? rw_verify_area+0xea/0x2b0 [ 855.691592] do_splice_direct+0x18d/0x230 [ 855.691604] ? splice_direct_to_actor+0x7b0/0x7b0 [ 855.691616] ? rw_verify_area+0xea/0x2b0 [ 855.691627] do_sendfile+0x4db/0xbd0 [ 855.691641] ? do_compat_pwritev64+0x140/0x140 [ 855.691651] ? fput+0xd4/0x150 [ 855.691661] SyS_sendfile64+0x102/0x110 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 855.691670] ? SyS_sendfile+0x130/0x130 [ 855.691681] ? do_syscall_64+0x53/0x640 [ 855.732143] ? SyS_sendfile+0x130/0x130 [ 855.736137] do_syscall_64+0x1e8/0x640 [ 855.740030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 855.744890] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 855.750084] RIP: 0033:0x45a919 [ 855.753282] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 855.760989] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 855.760995] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 855.761000] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 855.761005] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 855.761010] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:28 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1000, 0x100000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x9, @ipv4={[], [], @broadcast}}}, [0xb55, 0x5, 0x800, 0x1, 0x76, 0x6, 0x40000000, 0x4, 0x5, 0x4, 0xffffffffffffff9f, 0x8, 0x7, 0x0, 0x10000]}, &(0x7f0000000200)=0x100) ioctl$SIOCNRDECOBS(r0, 0x89e2) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1}, 0x8) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r3, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:28 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r2, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x401) getpeername$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@null, @netrom, @null, @remote, @null, @netrom, @netrom, @null]}, &(0x7f0000000100)=0x48) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x310}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d218121b", @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80000}, 0x20) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x5c, r3, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x40c8) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:28 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x86280, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0x16, 0x7, 0x1, {{0x9, 'security@'}, 0x5}}, 0x16) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:29 executing program 1 (fault-call:7 fault-nth:7): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="66643d6951671b8ffa2d3c3c691d82e4c869575e24601128163710cf9d360ba66588f1d6697326fef560a29290d764562a3db1d211b23707b79a71625f19727c0507cf1e1e9684c27316cbb6d460dc96675c63900d444c305da48d7cdc63a9613eeecd9c9cf5e58cd822c0a8c6ddb70a0a02eb05ce0f000000000000ae70977216929b67fcfb2eaec24ba99731f9ba3b327afc07a9720b6ea7d70fa8", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) migrate_pages(0xffffffffffffffff, 0x4, &(0x7f0000000040)=0x3, &(0x7f0000000080)) 14:14:29 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x27, 0x0, &(0x7f0000000040)) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) 14:14:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2a8) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="5b76a74cc9aae4233a2ed0dad1cb6cf44cfc9eaa04889266257d51eb98c9dd8b515486806b9de1666db3e195281886669a85c9a2d05219b0c9da0e5e0ae5e2377e881e63f01ca21848f0eb65abd626c23e2b3cb46dd142fc337d34c2bef435964ee9eb18b220bece00495dc7c3a58434060637bee4bce0f26ed852668e9e706ff5ba2766d6d590145029ff755fcab65f4ec48b727a824444a594e75d27becd2269181945d6e6a422668f46dba1606e8b6f771ab70a969292dd92b7035f8565a940fae650470cca70ae31ec6ee33fb0b6bee0259541a556924365fcda93df07f910", 0xe1}, {&(0x7f0000000180)="1c2c7f24a33416fa0db540e587ff4d769d6d3104a7f36b06ad5f62eb9dac78e1f5cf193a54eadf8fbf47363869c76a7dd580aa80e8a9138cbde90e20f024b68d0caa3fc7bfbcd91d9d9126bf74d604435062c6a90541c47d9110b43889bdc479c60651c085115f5d1f3fad000bbd32b65bfa1428b4c84b", 0x77}], 0x2, &(0x7f00000002c0)=[{0x78, 0x104, 0x40, "e289a0e0cb25ffd1c1888fe270c5fa0652172ff4f30f97f9c2d44263431c7b55a0e875c652d30b31d02d931fe2892006b24579d252daa4bb04d36ad5f517c2e1ecf4e0a8eef91f5fa893735b78798a34880634ee25746b26200d75b607f45c9248"}], 0x78}}], 0x1, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8000000000000, 0x40, &(0x7f0000001280)=ANY=[@ANYBLOB="726177940001b000000000000000000000000000000000000000000000000000020000000300000048020000000000000000000000000000e0000000e0000000b0010000b0010000b0010000b0010000b0010000030000000000000000000000ffffffffac1e000100000000000000006970366772657461703000000000000065716c00bc0000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e00000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000d8000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000010000001e12932f8c1cec59e3c948000000ed4f00002fbc473400000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000260000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000"], 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001640)={0x0}, &(0x7f0000001680)=0xc) r6 = getpgid(0xffffffffffffffff) setpgid(r5, r6) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001200)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCL_SETSEL(r7, 0x541c, &(0x7f0000001240)={0x2, {0x2, 0x9, 0xc38, 0x80, 0x800, 0x2}}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f0000001540)=ANY=[@ANYRESDEC, @ANYRES32], 0x2) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f00000011c0)) r8 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f00000015c0)={0x0, 0x40}, &(0x7f0000001600)=0x8) r9 = dup3(0xffffffffffffffff, r2, 0xc0000) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r8, 0x80605414, &(0x7f00000016c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r9, 0xc0405519, &(0x7f0000001180)={0x8, 0x1, 0x3, 0x1, 'syz1\x00', 0x7}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000010c0)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/4096}, &(0x7f0000001140)=0x78) r10 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r10, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDCTL_DSP_GETODELAY(r10, 0x80045017, &(0x7f0000001740)) [ 856.347233] FAULT_INJECTION: forcing a failure. [ 856.347233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 856.375735] CPU: 1 PID: 7925 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 856.383914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.393279] Call Trace: [ 856.393303] dump_stack+0x142/0x197 [ 856.393321] should_fail.cold+0x10f/0x159 [ 856.393332] ? __might_sleep+0x93/0xb0 [ 856.393346] __alloc_pages_nodemask+0x1d6/0x7a0 [ 856.393359] ? __alloc_pages_slowpath+0x2930/0x2930 [ 856.393368] ? lock_downgrade+0x740/0x740 [ 856.393386] alloc_pages_vma+0xc9/0x4c0 [ 856.393398] shmem_alloc_page+0xf6/0x1a0 [ 856.393406] ? shmem_swapin+0x1a0/0x1a0 [ 856.393417] ? cred_has_capability+0x142/0x290 [ 856.393424] ? find_held_lock+0x35/0x130 [ 856.393433] ? check_preemption_disabled+0x3c/0x250 [ 856.393447] ? __this_cpu_preempt_check+0x1d/0x30 [ 856.399700] ? percpu_counter_add_batch+0x112/0x160 [ 856.399720] ? __vm_enough_memory+0x26a/0x490 [ 856.399737] shmem_alloc_and_acct_page+0x12a/0x680 [ 856.433880] shmem_getpage_gfp+0x3e7/0x2870 [ 856.433904] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 856.433919] shmem_file_read_iter+0x49e/0xb20 [ 856.442575] ? shmem_writepage+0xc80/0xc80 [ 856.442588] ? iov_iter_pipe+0x9f/0x2c0 [ 856.442603] generic_file_splice_read+0x37d/0x600 14:14:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x100, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) [ 856.442613] ? fsnotify+0x11e0/0x11e0 [ 856.442624] ? add_to_pipe+0x340/0x340 [ 856.442642] ? rw_verify_area+0xea/0x2b0 [ 856.442649] ? add_to_pipe+0x340/0x340 [ 856.442659] do_splice_to+0x105/0x170 [ 856.442670] splice_direct_to_actor+0x222/0x7b0 [ 856.442683] ? generic_pipe_buf_nosteal+0x10/0x10 [ 856.452608] ? do_splice_to+0x170/0x170 [ 856.452620] ? rw_verify_area+0xea/0x2b0 [ 856.452630] do_splice_direct+0x18d/0x230 [ 856.452645] ? splice_direct_to_actor+0x7b0/0x7b0 [ 856.452659] ? rw_verify_area+0xea/0x2b0 [ 856.452670] do_sendfile+0x4db/0xbd0 [ 856.452686] ? do_compat_pwritev64+0x140/0x140 [ 856.452697] ? fput+0xd4/0x150 [ 856.452706] SyS_sendfile64+0x102/0x110 [ 856.452714] ? SyS_sendfile+0x130/0x130 [ 856.452723] ? do_syscall_64+0x53/0x640 [ 856.452731] ? SyS_sendfile+0x130/0x130 [ 856.452743] do_syscall_64+0x1e8/0x640 [ 856.576587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 856.581423] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 856.586609] RIP: 0033:0x45a919 [ 856.589892] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 856.597588] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 856.605062] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 856.612325] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 856.619627] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 856.627082] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:29 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r2, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:29 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r2, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:29 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) r1 = dup(0xffffffffffffffff) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000180)={0x60002014}) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r6 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r1, &(0x7f0000000a00)=@known='com.apple.system.Security\x00', &(0x7f0000000a40)='ip6gretap0\x00', 0xb, 0x4) sendmsg$nl_generic(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r6, &(0x7f0000000c00)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000e40)={0x194, r7, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x48}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xeb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6f7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x92}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) recvfrom(r5, &(0x7f00000006c0)=""/202, 0xca, 0x20, &(0x7f00000007c0)=@un=@file={0x1, './file0\x00'}, 0x80) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000040)=""/37, 0x25}, &(0x7f0000000080), 0x8}, 0x20) r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r9 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r9, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$TIOCSISO7816(r9, 0xc0285443, &(0x7f00000001c0)={0x400, 0x0, 0x401, 0x1, 0x1}) fcntl$setpipe(r8, 0x407, 0xffffffffffff8001) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000300)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="00000022dc3eeeaef775726da72cb3b9093e14aded6028e7d6342fd548c79d5b864a6e68dcbd940500000013282c53f44659475f64d50d456070c707f837bea00eacb5c549e7ea0e3cd0f460bd17b2abe071d3f8c47f5eaf84ff24eee86d16ab5bb925d80de96a61916630da6cb6f3b604bd3e1ebfd9131169e976385b0517e00ffb44b3b6d3510c775ecc7c2c1126f9bccad5b3de280f0bc4a546d16d60e66b5f6e847a0c79f304714598aa547f1a356646e8c7ce1db89bb0513e5fa1beeea8e56da7544afae7a55a48acc36494a1258aa69f43740e7a88d430bd357b5f53991ca85f5268b35736", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d967f88858e03723f0f1e932fc3714ebd81bf7e1921dce4b2ed93e97bb37060b9452078cb394008ae4553e589dd573275d55997d54f", @ANYRESDEC=0x0]) connect$nfc_raw(r2, &(0x7f0000000c40)={0x27, 0x1, 0x0, 0x4}, 0x10) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0xffffffffffffffa9) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) 14:14:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:29 executing program 1 (fault-call:7 fault-nth:8): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000100)=""/253, 0xfd) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1, 0xff}) 14:14:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:29 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) close(r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_buf(r0, 0x0, 0x26, 0x0, &(0x7f0000000000)=0x990d) 14:14:29 executing program 0: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a68, 0x0, [], @value64=0x7}}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x15, "374066eabba57f7411ac9221ef7686de1b9e1238987dcdab8aa0c886c94d955a", 0x3, 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x400040, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)="bc4239b87eb08a810fa03d53b2d56788497ab5c8d27bc2d20ceebab5dddc715b2d3febd1a36ada7ed4", 0x2c4}, {&(0x7f0000000180)="a4313dbcb848ae8e155ec8690da648c13f84508c43c7306c63865d928745104f355674b604af67a35b6fc1ff2ce77b477b0cad6546976482525651e66f255ea7315f7cb7c397d177171735f211ce7f87609dca7d8d88752d696b24e5d3b49519715cb6f1e6b8bf71763cac0915b70c3c70611f31becc2028117ba0720334d1414bfb548b45a1b24f545cce83f6295d743bc78daa4dfbbe265f8d6e7638dd550c4c2b8438aba5b6feaa56c284f9bd2876a5d627648dc7709caf7dd92ab6ecfe33cf8074", 0xffffffffffffff33}, {&(0x7f0000000380)="1dd17e66f71add30331eca0baf3789c3f486675ec3c480d4dc9c766fea1d408806adb19f459135c576f93431e5d0651450378cbfe67f93520797f856ddde6e954990d38b07", 0x45}], 0x1) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:29 executing program 0: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r0, 0x7, 0x80, 0x4, 0x1ff, 0x401}, 0x14) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 857.196681] FAULT_INJECTION: forcing a failure. [ 857.196681] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 857.222501] CPU: 1 PID: 7977 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 857.230371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.239738] Call Trace: [ 857.242346] dump_stack+0x142/0x197 [ 857.245993] should_fail.cold+0x10f/0x159 [ 857.250156] ? __might_sleep+0x93/0xb0 [ 857.254148] __alloc_pages_nodemask+0x1d6/0x7a0 [ 857.258833] ? __alloc_pages_slowpath+0x2930/0x2930 [ 857.263861] ? lock_downgrade+0x740/0x740 [ 857.268202] alloc_pages_vma+0xc9/0x4c0 [ 857.272196] shmem_alloc_page+0xf6/0x1a0 [ 857.276273] ? shmem_swapin+0x1a0/0x1a0 [ 857.280338] ? cred_has_capability+0x142/0x290 [ 857.280349] ? find_held_lock+0x35/0x130 [ 857.280358] ? check_preemption_disabled+0x3c/0x250 [ 857.280369] ? __this_cpu_preempt_check+0x1d/0x30 [ 857.280379] ? percpu_counter_add_batch+0x112/0x160 [ 857.280393] ? __vm_enough_memory+0x26a/0x490 [ 857.280408] shmem_alloc_and_acct_page+0x12a/0x680 [ 857.280420] shmem_getpage_gfp+0x3e7/0x2870 [ 857.280438] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 857.289195] shmem_file_read_iter+0x49e/0xb20 [ 857.289222] ? shmem_writepage+0xc80/0xc80 [ 857.289233] ? iov_iter_pipe+0x9f/0x2c0 [ 857.289248] generic_file_splice_read+0x37d/0x600 [ 857.289258] ? fsnotify+0x11e0/0x11e0 [ 857.289271] ? add_to_pipe+0x340/0x340 [ 857.348478] ? rw_verify_area+0xea/0x2b0 [ 857.352545] ? add_to_pipe+0x340/0x340 [ 857.356430] do_splice_to+0x105/0x170 [ 857.360299] splice_direct_to_actor+0x222/0x7b0 [ 857.364966] ? generic_pipe_buf_nosteal+0x10/0x10 [ 857.369816] ? do_splice_to+0x170/0x170 [ 857.373803] ? rw_verify_area+0xea/0x2b0 [ 857.377854] do_splice_direct+0x18d/0x230 [ 857.382226] ? splice_direct_to_actor+0x7b0/0x7b0 [ 857.387176] ? rw_verify_area+0xea/0x2b0 [ 857.391243] do_sendfile+0x4db/0xbd0 [ 857.394959] ? do_compat_pwritev64+0x140/0x140 [ 857.399527] ? fput+0xd4/0x150 [ 857.402710] SyS_sendfile64+0x102/0x110 [ 857.406671] ? SyS_sendfile+0x130/0x130 [ 857.410739] ? do_syscall_64+0x53/0x640 [ 857.414721] ? SyS_sendfile+0x130/0x130 [ 857.418699] do_syscall_64+0x1e8/0x640 [ 857.422586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 857.427549] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 857.432876] RIP: 0033:0x45a919 [ 857.436051] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 14:14:30 executing program 2: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9f0000, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a68, 0x0, [], @value64=0x7}}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x15, "374066eabba57f7411ac9221ef7686de1b9e1238987dcdab8aa0c886c94d955a", 0x3, 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp1\x00', 0x400040, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)="bc4239b87eb08a810fa03d53b2d56788497ab5c8d27bc2d20ceebab5dddc715b2d3febd1a36ada7ed4", 0x2c4}, {&(0x7f0000000180)="a4313dbcb848ae8e155ec8690da648c13f84508c43c7306c63865d928745104f355674b604af67a35b6fc1ff2ce77b477b0cad6546976482525651e66f255ea7315f7cb7c397d177171735f211ce7f87609dca7d8d88752d696b24e5d3b49519715cb6f1e6b8bf71763cac0915b70c3c70611f31becc2028117ba0720334d1414bfb548b45a1b24f545cce83f6295d743bc78daa4dfbbe265f8d6e7638dd550c4c2b8438aba5b6feaa56c284f9bd2876a5d627648dc7709caf7dd92ab6ecfe33cf8074", 0xffffffffffffff33}, {&(0x7f0000000380)="1dd17e66f71add30331eca0baf3789c3f486675ec3c480d4dc9c766fea1d408806adb19f459135c576f93431e5d0651450378cbfe67f93520797f856ddde6e954990d38b07", 0x45}], 0x1) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) [ 857.443745] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 857.451783] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 857.459061] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 857.466330] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 857.473600] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:30 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r2 = socket(0x1e, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x203, 0xffffffffffffffff) ioctl$TIOCNOTTY(r3, 0x5422) close(r2) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r5, 0x5}, 0x14) openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0xf783b9b15df8051, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r5, 0x3, 0x10}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r6, @ANYBLOB="490000003340eaf6a1b0cd9935859ad8e9b4d47a9c56f89b1546630cd52a1f3dac0f07d9d05fcef028df545f2406f5a89241123f476e82bad6e699a46d45da8d54a61fbc9f4f37a7f7a4501cff"], &(0x7f0000000200)=0x51) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "c0def11070d5418f"}, 0x9, 0x4) 14:14:30 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:30 executing program 1 (fault-call:7 fault-nth:9): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030307cfa2e2bc354c1d7f978303030303030303034303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) syz_init_net_socket$ax25(0x3, 0x674b4e2bad85dbbb, 0xcd) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000080)) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000040)) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000000c0)=0x2, 0x4) 14:14:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 858.017195] FAULT_INJECTION: forcing a failure. [ 858.017195] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 858.034132] CPU: 1 PID: 8026 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 858.041956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.041961] Call Trace: [ 858.041980] dump_stack+0x142/0x197 [ 858.041998] should_fail.cold+0x10f/0x159 [ 858.042010] ? __might_sleep+0x93/0xb0 [ 858.042024] __alloc_pages_nodemask+0x1d6/0x7a0 [ 858.042036] ? __alloc_pages_slowpath+0x2930/0x2930 [ 858.042046] ? lock_downgrade+0x740/0x740 [ 858.042064] alloc_pages_vma+0xc9/0x4c0 [ 858.054109] shmem_alloc_page+0xf6/0x1a0 [ 858.054119] ? shmem_swapin+0x1a0/0x1a0 [ 858.061882] ? cred_has_capability+0x142/0x290 [ 858.061893] ? find_held_lock+0x35/0x130 [ 858.061902] ? check_preemption_disabled+0x3c/0x250 [ 858.061913] ? __this_cpu_preempt_check+0x1d/0x30 [ 858.061924] ? percpu_counter_add_batch+0x112/0x160 [ 858.061940] ? __vm_enough_memory+0x26a/0x490 [ 858.070483] shmem_alloc_and_acct_page+0x12a/0x680 [ 858.070499] shmem_getpage_gfp+0x3e7/0x2870 [ 858.079764] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 858.079784] shmem_file_read_iter+0x49e/0xb20 [ 858.079803] ? shmem_writepage+0xc80/0xc80 [ 858.079816] ? iov_iter_pipe+0x9f/0x2c0 [ 858.105483] generic_file_splice_read+0x37d/0x600 [ 858.105496] ? fsnotify+0x11e0/0x11e0 [ 858.105508] ? add_to_pipe+0x340/0x340 [ 858.105530] ? rw_verify_area+0xea/0x2b0 14:14:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 858.115488] ? add_to_pipe+0x340/0x340 [ 858.115499] do_splice_to+0x105/0x170 [ 858.115514] splice_direct_to_actor+0x222/0x7b0 [ 858.115527] ? generic_pipe_buf_nosteal+0x10/0x10 [ 858.115540] ? do_splice_to+0x170/0x170 [ 858.115548] ? rw_verify_area+0xea/0x2b0 [ 858.115561] do_splice_direct+0x18d/0x230 [ 858.125143] ? splice_direct_to_actor+0x7b0/0x7b0 [ 858.125159] ? rw_verify_area+0xea/0x2b0 [ 858.125171] do_sendfile+0x4db/0xbd0 [ 858.125189] ? do_compat_pwritev64+0x140/0x140 [ 858.125200] ? fput+0xd4/0x150 14:14:30 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) poll(&(0x7f00000000c0)=[{r0, 0x4009}], 0x1, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0405610, &(0x7f0000000140)={0x0, @win={{0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0}}) getegid() mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f748e6f64653d301c3030323030303030303030303030060000003030302c75736595aa8168725f69643d92e86c18b2c8687148fa7b0554e82d7b95c2e3868068543fc4b8933fdd3c813a148a346a51eaa4810000003a9df35b", @ANYRESDEC=0x0, @ANYBLOB="2c6759302d57f5b446a0", @ANYRESDEC=0x0]) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x30000, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) read$FUSE(r1, &(0x7f00000004c0), 0x1000) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000480)=0xfffffffffffffe76) ioctl$SNDRV_PCM_IOCTL_REWIND(0xffffffffffffffff, 0x40084146, &(0x7f0000000040)=0x7fff) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="340000000300000000000000000000b1bc1535566042d30013000000f08c13b974513a61ff000000000000"], 0x34) [ 858.125212] SyS_sendfile64+0x102/0x110 [ 858.139121] ? SyS_sendfile+0x130/0x130 [ 858.139134] ? do_syscall_64+0x53/0x640 [ 858.139145] ? SyS_sendfile+0x130/0x130 [ 858.139156] do_syscall_64+0x1e8/0x640 [ 858.139164] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 858.139180] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.147367] RIP: 0033:0x45a919 [ 858.147373] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 858.147384] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 14:14:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 858.147390] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 858.147396] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 858.147402] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 858.147408] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 [ 858.240144] net_ratelimit: 16 callbacks suppressed [ 858.240149] protocol 88fb is buggy, dev hsr_slave_0 [ 858.240260] protocol 88fb is buggy, dev hsr_slave_1 [ 858.240387] protocol 88fb is buggy, dev hsr_slave_0 [ 858.313301] protocol 88fb is buggy, dev hsr_slave_1 14:14:31 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:31 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:31 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000140)={0x4000001, 0x1, 'client1\x00', 0x2, "a1b9e6dd4a0f34fd", "c8d4f824dd899baf858d2e7384daecbc609a6035b79b0d3e5bd656f3da05241b", 0x9, 0x1f}) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:31 executing program 1 (fault-call:7 fault-nth:10): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) syz_read_part_table(0x9, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000040)="fec61e2395f0a6fc316c01bc0cb80f2ca392c0ebfbfd83528005b7ead6523b0a4b988e12c8e72f474bea390a078e1087c8e15487018254cc0592510c27f3589256ba211fefa85a7c7ee031b255bd27e3152640daec1efde89d31aadc80d96d2900bbc3d006953c4eeabd38ce45a03afd226370f38105d5201c4c18e56f0b8556f96456349f4b568721a909867aece34d463ae7f78f3534d6889d89802615a848de7b5b50e08d60a493f6aaba8841112967f5e3d8aa14b837d66fa96e3cc5df7de033a655cbc41c3842823c304759bb5368698278115ccc6183fad60589553956256062c8576079be06f75d374797c905", 0xf0, 0x6}, {&(0x7f0000000280)="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", 0xfb, 0x2}, {&(0x7f0000000480)="c3b571e298cf002d770ffd14e725b24a7a75466fe57197ef2d2be72123889081a2fad0b606fd0f17fb412c702b1ed08740edbb1531ab9f855f809ec2376218a272c142bca86825b29aa523cfdbb0cddf0aee848b3d2ab3e7740571846cd5d9241f86c397dfcfc62afafa41c0c5c5f8634f02d59ffdaeb2748785fb823b15faf9656859c256", 0x85, 0x20}, {&(0x7f0000000540)="d41b62c6c2272527273de0465f8aa889942ac71e499e6a316302fbbf538dc965f2a32e971bbeb0ff8ec6e1db9710e479a46558414d82dfb01503b8eb913273bd907ee6865d00b8da48bca7aade8c48bc9459cdb55270e20fd54e33d4567d3c3cf95ec1b1fd384984172f60a0973603e75744e76cc7319c483e5bb7622b58a340c7af307e3eb2f4c136", 0x89}, {&(0x7f0000000180)="fb21f4e8b10b4e6351ca9682f6ab3d5ccb13bed34129725a66799a7453893c", 0x1f, 0x4}, {&(0x7f00000001c0)="4e87d000e727d7fe3bf6690fffaa08da", 0x10, 0x80000000}, {&(0x7f0000000380), 0x0, 0x7f}, {&(0x7f0000000600)="702f3f763374607e998fee93ecfa62887eddefa60fc7e8651045eebedde95523d7f072e24174b89c15321b515cf1edb48842aea057f3cabd1b30a96f2613a9a668d3b0ae9a3d95890a899c42542966ce0d39aecbdd1c53c1b4386b15859dcc92c628c665935a8ad8", 0x68, 0x2}, {&(0x7f0000000680)="afcd1a4d2fe0d3bba5e64b397f9bfd601567071bb0fe9b1be032a57b78c7f17c2ae974b218443ff1ff39de25", 0x2c, 0x1}]) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:31 executing program 0: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000000c0)=0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x6d) [ 858.859031] FAULT_INJECTION: forcing a failure. [ 858.859031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 858.913411] CPU: 1 PID: 8085 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 858.921337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.930707] Call Trace: [ 858.933310] dump_stack+0x142/0x197 [ 858.936962] should_fail.cold+0x10f/0x159 [ 858.941118] ? __might_sleep+0x93/0xb0 [ 858.945024] __alloc_pages_nodemask+0x1d6/0x7a0 [ 858.949711] ? __alloc_pages_slowpath+0x2930/0x2930 [ 858.954742] ? lock_downgrade+0x740/0x740 [ 858.958911] alloc_pages_vma+0xc9/0x4c0 [ 858.962898] shmem_alloc_page+0xf6/0x1a0 [ 858.966968] ? shmem_swapin+0x1a0/0x1a0 [ 858.970956] ? cred_has_capability+0x142/0x290 [ 858.975578] ? find_held_lock+0x35/0x130 [ 858.979654] ? check_preemption_disabled+0x3c/0x250 [ 858.985551] ? __this_cpu_preempt_check+0x1d/0x30 [ 858.990414] ? percpu_counter_add_batch+0x112/0x160 [ 858.995449] ? __vm_enough_memory+0x26a/0x490 [ 858.999964] shmem_alloc_and_acct_page+0x12a/0x680 [ 859.004913] shmem_getpage_gfp+0x3e7/0x2870 [ 859.009259] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 859.014313] shmem_file_read_iter+0x49e/0xb20 [ 859.018836] ? shmem_writepage+0xc80/0xc80 [ 859.023082] ? iov_iter_pipe+0x9f/0x2c0 [ 859.027078] generic_file_splice_read+0x37d/0x600 [ 859.031934] ? fsnotify+0x11e0/0x11e0 [ 859.035752] ? add_to_pipe+0x340/0x340 [ 859.039924] ? rw_verify_area+0xea/0x2b0 [ 859.043997] ? add_to_pipe+0x340/0x340 [ 859.047898] do_splice_to+0x105/0x170 [ 859.051712] splice_direct_to_actor+0x222/0x7b0 [ 859.056396] ? generic_pipe_buf_nosteal+0x10/0x10 [ 859.061256] ? do_splice_to+0x170/0x170 [ 859.065243] ? rw_verify_area+0xea/0x2b0 [ 859.069316] do_splice_direct+0x18d/0x230 [ 859.073478] ? splice_direct_to_actor+0x7b0/0x7b0 [ 859.078417] ? rw_verify_area+0xea/0x2b0 [ 859.082577] do_sendfile+0x4db/0xbd0 [ 859.086306] ? do_compat_pwritev64+0x140/0x140 [ 859.090918] ? fput+0xd4/0x150 [ 859.094123] SyS_sendfile64+0x102/0x110 [ 859.098104] ? SyS_sendfile+0x130/0x130 [ 859.102084] ? do_syscall_64+0x53/0x640 [ 859.106073] ? SyS_sendfile+0x130/0x130 [ 859.110056] do_syscall_64+0x1e8/0x640 14:14:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="72610001b00000000000000000000000000000000000000000bddd70b8000200000003000000480200000000000000000000e800000000b8010000b8010000b801000b4572055189ab560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e000000000000000000000000000000000000000000000006970636f6d70000000000000000000000000000000000000000000000000000004d4000004d500000000000000002800727066696c7465000000000000000000000000000000000000000000000000000020004e4f545241434b0000969d9bc10bcce42acba3f8a4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000390000000000007000d00000000000000000000000000000000000000000006000434c55535445524950000000000000000000000000000000000000002c0220bc9e0ffccfca297238cea709f4000000000000aaaaaaaaaabb030000000000000000000000000000000000000000000400000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000040000000000feffffff0000000000000000ab1a8d2486be08934a8808a04395f2083c94c3a54500"], 0x1e) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$TIOCGPTPEER(r2, 0x5441, 0x1) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) getsockname(r1, &(0x7f0000000080)=@isdn, &(0x7f0000000100)=0x80) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x6, 0x4) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) 14:14:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r1 = accept$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) fcntl$getown(r1, 0x9) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$VIDIOC_S_AUDIO(r6, 0x40345622, &(0x7f00000005c0)={0x1, "20dc1ece355a994792b9dabe709bad89a5daa8867dcd36c78df4f55cc3b228db", 0x3, 0x1}) r7 = socket(0x2, 0x6, 0x3) bind$alg(r7, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={r5, 0x4}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000500)={r5, 0x0, &(0x7f0000000340), &(0x7f0000000380)=[0x1, 0x1, 0x1, 0x2092], 0x73, 0x5, 0x7f, &(0x7f0000000440)=[0x3, 0x0, 0x3, 0xab, 0xffff15d9], &(0x7f0000000480)=[0x1b34fedb, 0x2]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x60000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x70, 0x0, 0x2, 0x4, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x14}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4c8848ee}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1e}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xe33}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}]}, 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = socket(0x1e, 0x2, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r3, 0x5}, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={r3, 0x5}, &(0x7f0000000080)=0x8) [ 859.113955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 859.118813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 859.124007] RIP: 0033:0x45a919 [ 859.127187] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 859.134915] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 859.142198] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 859.149717] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 859.157104] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 14:14:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 859.164437] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:32 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:32 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 859.510123] protocol 88fb is buggy, dev hsr_slave_0 [ 859.515330] protocol 88fb is buggy, dev hsr_slave_1 14:14:32 executing program 1 (fault-call:7 fault-nth:11): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) [ 859.680348] FAULT_INJECTION: forcing a failure. [ 859.680348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 859.692351] CPU: 0 PID: 8121 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 859.700152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.709516] Call Trace: [ 859.712120] dump_stack+0x142/0x197 [ 859.715741] should_fail.cold+0x10f/0x159 [ 859.719900] ? __might_sleep+0x93/0xb0 [ 859.723779] __alloc_pages_nodemask+0x1d6/0x7a0 [ 859.728437] ? __alloc_pages_slowpath+0x2930/0x2930 [ 859.733440] ? lock_downgrade+0x740/0x740 [ 859.737594] alloc_pages_vma+0xc9/0x4c0 [ 859.741570] shmem_alloc_page+0xf6/0x1a0 [ 859.745622] ? shmem_swapin+0x1a0/0x1a0 [ 859.749596] ? cred_has_capability+0x142/0x290 [ 859.754165] ? find_held_lock+0x35/0x130 [ 859.758244] ? check_preemption_disabled+0x3c/0x250 [ 859.763257] ? __this_cpu_preempt_check+0x1d/0x30 [ 859.768100] ? percpu_counter_add_batch+0x112/0x160 [ 859.773110] ? __vm_enough_memory+0x26a/0x490 [ 859.777612] shmem_alloc_and_acct_page+0x12a/0x680 [ 859.782535] shmem_getpage_gfp+0x3e7/0x2870 [ 859.786850] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 859.791858] shmem_file_read_iter+0x49e/0xb20 [ 859.796364] ? shmem_writepage+0xc80/0xc80 [ 859.800586] ? iov_iter_pipe+0x9f/0x2c0 [ 859.804590] generic_file_splice_read+0x37d/0x600 [ 859.809430] ? fsnotify+0x11e0/0x11e0 [ 859.813218] ? add_to_pipe+0x340/0x340 [ 859.817094] ? rw_verify_area+0xea/0x2b0 [ 859.821142] ? add_to_pipe+0x340/0x340 [ 859.825109] do_splice_to+0x105/0x170 [ 859.828922] splice_direct_to_actor+0x222/0x7b0 [ 859.833598] ? generic_pipe_buf_nosteal+0x10/0x10 [ 859.838440] ? do_splice_to+0x170/0x170 [ 859.842410] ? rw_verify_area+0xea/0x2b0 [ 859.846489] do_splice_direct+0x18d/0x230 [ 859.850628] ? splice_direct_to_actor+0x7b0/0x7b0 [ 859.855462] ? rw_verify_area+0xea/0x2b0 [ 859.859512] do_sendfile+0x4db/0xbd0 [ 859.863231] ? do_compat_pwritev64+0x140/0x140 [ 859.868325] ? fput+0xd4/0x150 [ 859.871534] SyS_sendfile64+0x102/0x110 [ 859.875506] ? SyS_sendfile+0x130/0x130 [ 859.879494] ? do_syscall_64+0x53/0x640 [ 859.883726] ? SyS_sendfile+0x130/0x130 [ 859.887698] do_syscall_64+0x1e8/0x640 [ 859.891582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 859.896428] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 859.901609] RIP: 0033:0x45a919 [ 859.904812] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 859.912508] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 859.919778] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 14:14:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x10000, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000180), 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x501000, 0x0) write$FUSE_STATFS(r2, &(0x7f0000000080)={0x60, 0xfffffffffffffff5, 0xfffffffffffffffe, {{0xfffffffffffffe00, 0x5, 0x800, 0x8f7, 0x1, 0x40, 0x2, 0x1}}}, 0x60) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev\xb0d\x83m-control\x00', 0x200800, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x4) [ 859.927057] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 859.934338] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 859.941795] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 [ 859.950204] protocol 88fb is buggy, dev hsr_slave_0 [ 859.955477] protocol 88fb is buggy, dev hsr_slave_1 [ 859.960628] protocol 88fb is buggy, dev hsr_slave_0 [ 859.965797] protocol 88fb is buggy, dev hsr_slave_1 14:14:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2b, 0x0, &(0x7f0000000000)=0xfffffd09) r1 = dup(r0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2a8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xfff5) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x17) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000080)=0x4) 14:14:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:14:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)={0xf4, 0x20, 0x829, 0x0, 0x0, {0x12, 0x1000000}, [@generic="8b44fdedf51c23de9a26b08f73bf8a599dd251010c2d47f10a9c66f181395cfbf536da4c4eaf5aa495ae7955ac4683ed7fe910db9acd97ff7f65e90155bc508fb332918125b6a936dc3fc3914e005f062e875946e423a3d7eb69534098ddc31a1d5accd447518850dbbc156b106bec8b3e1234e2824706446e0ac01b650e17d287004cc3d9e014e90a1aa5fd158d4254418d3d9c7d7baa79d15b0d484d7b2ec8b9e37e57bd59725f5f9fed27561014f803ccc507daa6206cd13ebd2ec6aad30e92c0bc52", @nested={0x4, 0x57}, @generic="3d2500f4f525abe52a473cb03ac3cb20432eedf0b1"]}, 0xf4}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) fallocate(r4, 0x10, 0x7a, 0x401) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000540)={0xf60, 0x5, 0x4, 0x800, 0xb5, {0x77359400}, {0x3, 0x0, 0xac, 0x81, 0xff, 0x3, "67ed4d89"}, 0x7fff, 0x4, @fd, 0x1000, 0x0, r1}) r6 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x5, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000600)=r6) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x20, r7, 0x201, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6c}]}]}, 0x20}}, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x1) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000000100)={&(0x7f0000000880)=ANY=[@ANYBLOB="9f606c5cb4d2826e8ee06cb68210", @ANYRES16=r7, @ANYBLOB="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"], 0x16c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000051) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/\xdcuse\x00', 0x2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6572070070d00000001f4ee30c2d7f1ef3c5f6fc570ed975c7fb94525b5a1ed5cc897e69faa815e0746e7359c67a89347a5de67e40558c3586e2365093ae3cb9cd1d3cbf08205a72f22a06146ddcaf26b24de0e0660b516e404b235d412879839e826989548bbb2838003c222cfbda7b0e7aef6c156686857ad971d7f0cbf178e6ec83649fc9c9f9d691d43f0fe287e4fd90f0c482f5ade08f9e008595bb1651b6cc2008b6f5daa11500"/180, @ANYRESDEC=0x0]) r9 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r9, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) utime(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x8c14}) ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000000000)) write$FUSE_NOTIFY_INVAL_ENTRY(r8, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x34) 14:14:32 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8400, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000000c0)={0x1, 'ip6_vti0\x00', {}, 0xb8bb}) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0x3d, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r2, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:32 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0xe0, 0xe0, 0xe0, 0x0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', {}, {}, 0x67}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x8}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xc, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc]}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0xfffffffffffffe58) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) r1 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='vmnet1system+ppp0\x00', 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae720b872d4b7828e3b48522c673aa6cb366d4201e2aee3261eb52da262b1f", 0xf4, r2) keyctl$unlink(0x9, r1, r2) 14:14:32 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:32 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:33 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:33 executing program 1 (fault-call:7 fault-nth:12): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000040)) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x125080, 0x6) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f00000000c0)={r4, 0x4}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000100)={r4, 0x10}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r6, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x3f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1000}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7fffffff}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xc0}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xfff]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x40) [ 860.503125] FAULT_INJECTION: forcing a failure. [ 860.503125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 860.518945] CPU: 1 PID: 8177 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 860.526775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.536418] Call Trace: [ 860.539006] dump_stack+0x142/0x197 [ 860.542644] should_fail.cold+0x10f/0x159 [ 860.546794] ? __might_sleep+0x93/0xb0 [ 860.550688] __alloc_pages_nodemask+0x1d6/0x7a0 [ 860.555366] ? __alloc_pages_slowpath+0x2930/0x2930 [ 860.560386] ? lock_downgrade+0x740/0x740 [ 860.564547] alloc_pages_vma+0xc9/0x4c0 [ 860.568589] shmem_alloc_page+0xf6/0x1a0 [ 860.572651] ? shmem_swapin+0x1a0/0x1a0 [ 860.576619] ? cred_has_capability+0x142/0x290 [ 860.581210] ? find_held_lock+0x35/0x130 [ 860.585274] ? check_preemption_disabled+0x3c/0x250 [ 860.590303] ? __this_cpu_preempt_check+0x1d/0x30 [ 860.597066] ? percpu_counter_add_batch+0x112/0x160 [ 860.602093] ? __vm_enough_memory+0x26a/0x490 [ 860.606611] shmem_alloc_and_acct_page+0x12a/0x680 [ 860.611630] shmem_getpage_gfp+0x3e7/0x2870 [ 860.615964] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 860.621130] shmem_file_read_iter+0x49e/0xb20 [ 860.625776] ? shmem_writepage+0xc80/0xc80 [ 860.630028] ? iov_iter_pipe+0x9f/0x2c0 [ 860.634160] generic_file_splice_read+0x37d/0x600 [ 860.639010] ? fsnotify+0x11e0/0x11e0 [ 860.642873] ? add_to_pipe+0x340/0x340 [ 860.646831] ? rw_verify_area+0xea/0x2b0 [ 860.650973] ? add_to_pipe+0x340/0x340 [ 860.654856] do_splice_to+0x105/0x170 [ 860.658661] splice_direct_to_actor+0x222/0x7b0 [ 860.663331] ? generic_pipe_buf_nosteal+0x10/0x10 [ 860.668181] ? do_splice_to+0x170/0x170 [ 860.672169] ? rw_verify_area+0xea/0x2b0 [ 860.676241] do_splice_direct+0x18d/0x230 [ 860.680445] ? splice_direct_to_actor+0x7b0/0x7b0 [ 860.685291] ? rw_verify_area+0xea/0x2b0 [ 860.689342] do_sendfile+0x4db/0xbd0 [ 860.693129] ? do_compat_pwritev64+0x140/0x140 [ 860.697875] ? fput+0xd4/0x150 [ 860.701087] SyS_sendfile64+0x102/0x110 [ 860.705067] ? SyS_sendfile+0x130/0x130 [ 860.709039] ? do_syscall_64+0x53/0x640 [ 860.713024] ? SyS_sendfile+0x130/0x130 [ 860.717008] do_syscall_64+0x1e8/0x640 [ 860.720894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 860.725885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 860.731077] RIP: 0033:0x45a919 [ 860.734283] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 860.741988] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 860.749382] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 860.756772] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 860.764047] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 860.771313] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:14:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) 14:14:33 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:33 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:33 executing program 1 (fault-call:7 fault-nth:13): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x294000, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000080)=0x80) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = socket(0x1e, 0x2, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000140)=0x2, 0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={r5, 0x5}, 0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000040)={r5, 0xfff, 0xa5a496112d4ab90d, 0x200, 0x7}, &(0x7f00000000c0)=0x18) [ 861.333849] FAULT_INJECTION: forcing a failure. [ 861.333849] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 861.345973] CPU: 0 PID: 8208 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 861.353861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.363216] Call Trace: [ 861.365902] dump_stack+0x142/0x197 [ 861.369527] should_fail.cold+0x10f/0x159 [ 861.373676] ? __might_sleep+0x93/0xb0 [ 861.377578] __alloc_pages_nodemask+0x1d6/0x7a0 [ 861.382249] ? __alloc_pages_slowpath+0x2930/0x2930 [ 861.387265] ? lock_downgrade+0x740/0x740 [ 861.391493] alloc_pages_vma+0xc9/0x4c0 [ 861.395476] shmem_alloc_page+0xf6/0x1a0 [ 861.399535] ? shmem_swapin+0x1a0/0x1a0 [ 861.403516] ? cred_has_capability+0x142/0x290 [ 861.408088] ? find_held_lock+0x35/0x130 [ 861.412138] ? check_preemption_disabled+0x3c/0x250 [ 861.417170] ? __this_cpu_preempt_check+0x1d/0x30 [ 861.422008] ? percpu_counter_add_batch+0x112/0x160 [ 861.427023] ? __vm_enough_memory+0x26a/0x490 [ 861.431513] shmem_alloc_and_acct_page+0x12a/0x680 [ 861.436436] shmem_getpage_gfp+0x3e7/0x2870 [ 861.440754] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 861.445764] shmem_file_read_iter+0x49e/0xb20 [ 861.450255] ? shmem_writepage+0xc80/0xc80 [ 861.454488] ? iov_iter_pipe+0x9f/0x2c0 [ 861.458476] generic_file_splice_read+0x37d/0x600 [ 861.463332] ? fsnotify+0x11e0/0x11e0 [ 861.467123] ? add_to_pipe+0x340/0x340 [ 861.471018] ? rw_verify_area+0xea/0x2b0 [ 861.475069] ? add_to_pipe+0x340/0x340 [ 861.478962] do_splice_to+0x105/0x170 [ 861.482765] splice_direct_to_actor+0x222/0x7b0 [ 861.487423] ? generic_pipe_buf_nosteal+0x10/0x10 [ 861.492268] ? do_splice_to+0x170/0x170 [ 861.496240] ? rw_verify_area+0xea/0x2b0 [ 861.500293] do_splice_direct+0x18d/0x230 [ 861.504439] ? splice_direct_to_actor+0x7b0/0x7b0 [ 861.509280] ? rw_verify_area+0xea/0x2b0 [ 861.513347] do_sendfile+0x4db/0xbd0 [ 861.517083] ? do_compat_pwritev64+0x140/0x140 [ 861.521663] ? fput+0xd4/0x150 [ 861.524860] SyS_sendfile64+0x102/0x110 [ 861.528830] ? SyS_sendfile+0x130/0x130 [ 861.532809] ? do_syscall_64+0x53/0x640 [ 861.536780] ? SyS_sendfile+0x130/0x130 [ 861.540744] do_syscall_64+0x1e8/0x640 [ 861.544638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 861.549473] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 861.554655] RIP: 0033:0x45a919 [ 861.557841] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 861.565537] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 861.572795] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 861.580316] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 861.587584] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 861.595475] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:34 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x200, &(0x7f00000000c0)=ANY=[@ANYRESDEC, @ANYRESHEX=r0, @ANYRESDEC=r1, @ANYRES64, @ANYBLOB=',group_id=', @ANYRESHEX]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0xa20000, 0x4, 0xffff31dc, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a7e, 0x1}}) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000280)={0x0, 0x0, {0x9, 0x9, 0x2018, 0xb, 0x7, 0x2, 0x2}}) 14:14:34 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f0000000280)={0x20, "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"}) 14:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ptrace$cont(0x18, 0xffffffffffffffff, 0xf23, 0x7) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x6, 0x13, 0x0, 'keyring,selftrusted'}}, 0x292) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x412100, 0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000080)={0x3ff, 0x5, [0x30, 0x81, 0x8, 0xffff], 0x1}) 14:14:34 executing program 1 (fault-call:7 fault-nth:14): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) 14:14:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 14:14:34 executing program 0: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) [ 862.235329] FAULT_INJECTION: forcing a failure. [ 862.235329] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 862.254072] CPU: 1 PID: 8262 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 862.261954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.271312] Call Trace: [ 862.273905] dump_stack+0x142/0x197 [ 862.277535] should_fail.cold+0x10f/0x159 [ 862.281673] ? __might_sleep+0x93/0xb0 [ 862.285633] __alloc_pages_nodemask+0x1d6/0x7a0 [ 862.290302] ? __alloc_pages_slowpath+0x2930/0x2930 [ 862.295318] ? lock_downgrade+0x740/0x740 [ 862.299468] alloc_pages_vma+0xc9/0x4c0 [ 862.303548] shmem_alloc_page+0xf6/0x1a0 [ 862.307610] ? shmem_swapin+0x1a0/0x1a0 [ 862.311574] ? cred_has_capability+0x142/0x290 [ 862.316180] ? find_held_lock+0x35/0x130 [ 862.320239] ? check_preemption_disabled+0x3c/0x250 [ 862.325267] ? __this_cpu_preempt_check+0x1d/0x30 [ 862.330192] ? percpu_counter_add_batch+0x112/0x160 [ 862.335333] ? __vm_enough_memory+0x26a/0x490 [ 862.339853] shmem_alloc_and_acct_page+0x12a/0x680 [ 862.344805] shmem_getpage_gfp+0x3e7/0x2870 [ 862.349299] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 862.354337] shmem_file_read_iter+0x49e/0xb20 [ 862.358831] ? shmem_writepage+0xc80/0xc80 [ 862.363055] ? iov_iter_pipe+0x9f/0x2c0 [ 862.367029] generic_file_splice_read+0x37d/0x600 [ 862.371994] ? fsnotify+0x11e0/0x11e0 [ 862.375800] ? add_to_pipe+0x340/0x340 [ 862.379695] ? rw_verify_area+0xea/0x2b0 [ 862.383767] ? add_to_pipe+0x340/0x340 [ 862.387775] do_splice_to+0x105/0x170 [ 862.391581] splice_direct_to_actor+0x222/0x7b0 [ 862.396415] ? generic_pipe_buf_nosteal+0x10/0x10 [ 862.401256] ? do_splice_to+0x170/0x170 [ 862.405233] ? rw_verify_area+0xea/0x2b0 [ 862.409297] do_splice_direct+0x18d/0x230 [ 862.413442] ? splice_direct_to_actor+0x7b0/0x7b0 [ 862.418371] ? rw_verify_area+0xea/0x2b0 [ 862.422453] do_sendfile+0x4db/0xbd0 [ 862.426202] ? do_compat_pwritev64+0x140/0x140 [ 862.430794] ? fput+0xd4/0x150 [ 862.434109] SyS_sendfile64+0x102/0x110 [ 862.438160] ? SyS_sendfile+0x130/0x130 [ 862.442128] ? do_syscall_64+0x53/0x640 [ 862.446182] ? SyS_sendfile+0x130/0x130 [ 862.450151] do_syscall_64+0x1e8/0x640 [ 862.454079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 862.458920] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 862.464106] RIP: 0033:0x45a919 [ 862.467285] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 862.475001] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 862.482261] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 862.489525] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 862.496796] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 862.504061] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:14:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f690e3d", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x1b, 0x3, 0x0, {0x6, 0xfffffffffffffeaa, 0x0, 'fuse\x00'}}, 0x26) 14:14:35 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000040)) 14:14:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="340000000300000000000000000000000000000000000000130000009ca200006b657972696e672c73656c667472757374656400"], 0x34) 14:14:35 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:35 executing program 0: futex(&(0x7f0000000040)=0x2, 0x0, 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="a5c2f38b8a95e2818b338972e5a2d79c1a008b", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x6, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) fallocate(r1, 0x4, 0xc0000000, 0x9) 14:14:35 executing program 1 (fault-call:7 fault-nth:15): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYBLOB="1f9bc73cfb0014a6185cf4611c7573fad6c714a3179c97193b43ab6141f0e856c7d01e6558e429701dee7a73a6143f210339c3a075e2d3cd9998888406a12853ea4c743202766f49e6b6db579c3ce25f320f0b146ee054bdc6b2d134af4e0243623fb8750122cd4fb72864d9c8d6123913d7de107dcc1896b1009e3ba369f1377ac85e53eec2fc82359982a440561f9d0bc926ac9363bdb126fb41eb4ac83a7a1ec98dcf527bdd2c0602298465e409c090e6effb4ce4cfadacb56e8f11fb5ecc5bd3755000abb760aa14b26bb01143b383cf10cdce46f5050144a1535dab820d6c9ad76f3f641d"]) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x200, 0x0) r4 = socket(0x1e, 0x2, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x5}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @multicast1}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000380)={r7, 0x1, 0x1, 0x2, 0x10000, 0x2}, 0x14) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r9 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x400, 0x0) getpeername$ax25(r9, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) socket$inet6(0xa, 0x80000, 0x7f) connect$pppoe(r9, &(0x7f00000001c0)={0x18, 0x0, {0x0, @empty, 'ip6gre0\x00'}}, 0x1e) ioctl$MON_IOCH_MFLUSH(r8, 0x9208, 0x2) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$FUSE_INIT(r10, &(0x7f0000000080)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x80000000, 0x1a81442, 0x8, 0xea2, 0x7, 0x7ff}}, 0x50) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000000000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) prctl$PR_CAPBSET_DROP(0x18, 0x18) [ 863.044435] FAULT_INJECTION: forcing a failure. [ 863.044435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 863.056479] CPU: 1 PID: 8305 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 863.064300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.073663] Call Trace: [ 863.076378] dump_stack+0x142/0x197 [ 863.080008] should_fail.cold+0x10f/0x159 [ 863.084167] ? __might_sleep+0x93/0xb0 [ 863.088109] __alloc_pages_nodemask+0x1d6/0x7a0 [ 863.092773] ? __alloc_pages_slowpath+0x2930/0x2930 [ 863.097780] ? lock_downgrade+0x740/0x740 [ 863.101925] alloc_pages_vma+0xc9/0x4c0 [ 863.105898] shmem_alloc_page+0xf6/0x1a0 [ 863.109951] ? shmem_swapin+0x1a0/0x1a0 [ 863.113925] ? cred_has_capability+0x142/0x290 [ 863.118494] ? find_held_lock+0x35/0x130 [ 863.122543] ? check_preemption_disabled+0x3c/0x250 [ 863.127548] ? __this_cpu_preempt_check+0x1d/0x30 [ 863.132391] ? percpu_counter_add_batch+0x112/0x160 [ 863.137402] ? __vm_enough_memory+0x26a/0x490 [ 863.141904] shmem_alloc_and_acct_page+0x12a/0x680 [ 863.146843] shmem_getpage_gfp+0x3e7/0x2870 [ 863.151193] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 863.156211] shmem_file_read_iter+0x49e/0xb20 [ 863.160740] ? shmem_writepage+0xc80/0xc80 [ 863.164967] ? iov_iter_pipe+0x9f/0x2c0 [ 863.168980] generic_file_splice_read+0x37d/0x600 [ 863.173811] ? fsnotify+0x11e0/0x11e0 [ 863.177620] ? add_to_pipe+0x340/0x340 [ 863.181595] ? rw_verify_area+0xea/0x2b0 [ 863.185663] ? add_to_pipe+0x340/0x340 [ 863.189567] do_splice_to+0x105/0x170 [ 863.193439] splice_direct_to_actor+0x222/0x7b0 [ 863.198113] ? generic_pipe_buf_nosteal+0x10/0x10 [ 863.202955] ? do_splice_to+0x170/0x170 [ 863.206983] ? rw_verify_area+0xea/0x2b0 [ 863.211032] do_splice_direct+0x18d/0x230 [ 863.215177] ? splice_direct_to_actor+0x7b0/0x7b0 [ 863.220029] ? rw_verify_area+0xea/0x2b0 [ 863.224092] do_sendfile+0x4db/0xbd0 [ 863.227846] ? do_compat_pwritev64+0x140/0x140 [ 863.232506] ? fput+0xd4/0x150 [ 863.235689] SyS_sendfile64+0x102/0x110 [ 863.239657] ? SyS_sendfile+0x130/0x130 [ 863.243654] ? do_syscall_64+0x53/0x640 [ 863.247794] ? SyS_sendfile+0x130/0x130 [ 863.251762] do_syscall_64+0x1e8/0x640 [ 863.255649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 863.260499] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 863.265709] RIP: 0033:0x45a919 [ 863.268893] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 863.276848] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 863.284107] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 863.291381] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 863.298660] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 863.305928] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 14:14:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) 14:14:36 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:36 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:36 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)) getuid() 14:14:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x1, 0x8}) [ 863.680116] net_ratelimit: 14 callbacks suppressed [ 863.680121] protocol 88fb is buggy, dev hsr_slave_0 [ 863.690188] protocol 88fb is buggy, dev hsr_slave_1 14:14:36 executing program 1 (fault-call:7 fault-nth:16): r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xffffffffffffffe5) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r1, 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000011c0)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f00000012c0)=0xe8) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r6, 0xa) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r6, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="9c030000070b080007000000fcdbdf250100000741f02456d49cff0fd35f608844e85f8c717e0e2f907de38f16b8923750260761a5a6c5492baffe797062ef7d25259ed570a6c7195410ef1401cac18915c0fdcfb1745f93c8eac0edc2d8ddcf5d34ccc23d96a0c790c97aea6284b3de42357230aa4c3b8bedc39570323e755d2ec2867e858b64b4b3e333f4e1cfe5ea1bac31ec979bbcf569ff1a93245038130bffd05fb83455b42ec5a8b3b543738fcc0acc131c92e755b058bc754bb20637e1bc887fb3e0e95a0a34fa8e02cac2ab5b7b37acc8022b001400450000000000000000000000000000000000e4f326a27f612b3e9538aadb83add7e9efa850046440d3f91c386c6374e1847c00c52c46cb90e63877616d8f3648619d6df43448bce418faf9a1987638a63ecdd2a3535229f63fd4bec93e7a0906148f982abed954bbf5f268fdfacbb68a1afa56af2c92550a1370dfd45dc63e58d3703fd64ac1f1b006d105e974f7111ffabad4e02a2c5edd1fb9d4fc3424915d49a3b74400b69f18d482e921f203776d30ecaf5c58006e4455195e6ca06ba0e4ef37c880212d66c9fc519e11df10e69e5b746e0b7729d96e6bee0aff2692c7561f17db", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r11, 0xa) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r11, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="08006b00040000000c0050000100000000000000f40078007ce9243ed67c0a1d31c213ba49df3fec62273d66e61436719d381e6cf949dabce56550f1aca55a0b9f95fa65f7cf57ca69d5bfa79773e0006660e968d79079eb226f0023745b0eaebb445e1c4726aa3928df7eb95fdda596f703017b74e0d02e67749f016ff4752315891ac6cbd9dc37bdf6cbc07aa298695bb52adbebb8584e358703c8101c158a384d8d80dc632e91a22bab49d88c1574e7e5cd5b373cb01292977523862c03aebb379a3d631741898560e44af88ca7fcfddc5cfb64387e2e2547de089bb1d2d253ecf46f37928e05f5e74bd7e0c9ea5e98d2696bfd5923dfa0f3b9463b3d45980cca45186d1d00000800", @ANYRES32=r14], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x3, &(0x7f0000001140)=[{&(0x7f00000000c0)="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", 0x1000, 0x7}, {&(0x7f00000010c0)="f52321ed89ee69893cac9ae62ac3fb148f90d5acd9dcfda865b7", 0x1a, 0x83}, {&(0x7f0000001100)="6757dbd9638abc48f3bd38b93a08462535f8a2de6a3fa3939c9881e5e108df044aee871cdbd466bc0a2dd0a7fa9ece90", 0x30, 0x7ff}], 0x800000, &(0x7f00000013c0)={[{@noload='noload'}, {@errors_remount='errors=remount-ro'}, {@nodiscard='nodiscard'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r3}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r5}}, {@fowner_gt={'fowner>', r8}}, {@uid_gt={'uid>', r10}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r13}}]}) 14:14:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 14:14:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x6, @mcast2, 0xd84a}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfffffffe}, &(0x7f0000000140)=0x8) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) [ 863.923926] FAULT_INJECTION: forcing a failure. [ 863.923926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 863.974441] CPU: 0 PID: 8347 Comm: syz-executor.1 Not tainted 4.14.160-syzkaller #0 [ 863.982374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.991749] Call Trace: [ 863.994356] dump_stack+0x142/0x197 [ 863.998011] should_fail.cold+0x10f/0x159 [ 864.002191] ? __might_sleep+0x93/0xb0 [ 864.006103] __alloc_pages_nodemask+0x1d6/0x7a0 [ 864.010796] ? __alloc_pages_slowpath+0x2930/0x2930 [ 864.015830] ? lock_downgrade+0x740/0x740 [ 864.020007] alloc_pages_vma+0xc9/0x4c0 [ 864.024002] shmem_alloc_page+0xf6/0x1a0 [ 864.028083] ? shmem_swapin+0x1a0/0x1a0 [ 864.032078] ? cred_has_capability+0x142/0x290 [ 864.036672] ? find_held_lock+0x35/0x130 [ 864.040749] ? check_preemption_disabled+0x3c/0x250 [ 864.045786] ? __this_cpu_preempt_check+0x1d/0x30 [ 864.050646] ? percpu_counter_add_batch+0x112/0x160 [ 864.055688] ? __vm_enough_memory+0x26a/0x490 [ 864.060212] shmem_alloc_and_acct_page+0x12a/0x680 [ 864.065170] shmem_getpage_gfp+0x3e7/0x2870 [ 864.069514] ? shmem_mfill_atomic_pte+0x17e0/0x17e0 [ 864.074549] shmem_file_read_iter+0x49e/0xb20 [ 864.079073] ? shmem_writepage+0xc80/0xc80 [ 864.083318] ? iov_iter_pipe+0x9f/0x2c0 [ 864.087309] generic_file_splice_read+0x37d/0x600 [ 864.092165] ? fsnotify+0x11e0/0x11e0 [ 864.095982] ? add_to_pipe+0x340/0x340 [ 864.099892] ? rw_verify_area+0xea/0x2b0 [ 864.103967] ? add_to_pipe+0x340/0x340 [ 864.107866] do_splice_to+0x105/0x170 [ 864.111687] splice_direct_to_actor+0x222/0x7b0 [ 864.116371] ? generic_pipe_buf_nosteal+0x10/0x10 [ 864.121229] ? do_splice_to+0x170/0x170 [ 864.125215] ? rw_verify_area+0xea/0x2b0 [ 864.129290] do_splice_direct+0x18d/0x230 [ 864.133458] ? splice_direct_to_actor+0x7b0/0x7b0 [ 864.138317] ? rw_verify_area+0xea/0x2b0 [ 864.142394] do_sendfile+0x4db/0xbd0 [ 864.146128] ? do_compat_pwritev64+0x140/0x140 [ 864.150725] ? fput+0xd4/0x150 [ 864.153932] SyS_sendfile64+0x102/0x110 [ 864.157919] ? SyS_sendfile+0x130/0x130 [ 864.161906] ? do_syscall_64+0x53/0x640 [ 864.165896] ? SyS_sendfile+0x130/0x130 [ 864.169883] do_syscall_64+0x1e8/0x640 [ 864.173872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 864.178737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 864.183937] RIP: 0033:0x45a919 [ 864.187131] RSP: 002b:00007fc9d4cd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 864.194847] RAX: ffffffffffffffda RBX: 00007fc9d4cd8c90 RCX: 000000000045a919 [ 864.202122] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 864.209403] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 864.216682] R10: 00000000eefffdef R11: 0000000000000246 R12: 00007fc9d4cd96d4 [ 864.223959] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000007 [ 864.240233] protocol 88fb is buggy, dev hsr_slave_0 [ 864.245381] protocol 88fb is buggy, dev hsr_slave_1 [ 864.250550] protocol 88fb is buggy, dev hsr_slave_0 [ 864.255641] protocol 88fb is buggy, dev hsr_slave_1 14:14:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000000c0)={0xe87fff7, 0x4, 0x7, r0, 0x0, &(0x7f0000000080)={0xa40a6c, 0x1000, [], @p_u16=&(0x7f0000000040)=0x7fff}}) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000100)) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) 14:14:37 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:37 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 864.550113] protocol 88fb is buggy, dev hsr_slave_0 [ 864.555426] protocol 88fb is buggy, dev hsr_slave_1 [ 864.560614] protocol 88fb is buggy, dev hsr_slave_0 [ 864.565731] protocol 88fb is buggy, dev hsr_slave_1 14:14:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r5 = accept4$inet(r4, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80800) r6 = socket(0x1e, 0x2, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000200)={r8, 0x5}, 0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000080)={r8, 0xfffffffb}, &(0x7f00000000c0)=0x8) 14:14:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101800, 0x0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000080)) getsockopt$inet_buf(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0xd32c9f123045b447, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r3, 0x80044dff, &(0x7f0000000100)) 14:14:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@remote, @netrom, @null, @rose, @null, @rose, @bcast, @rose]}, &(0x7f00000000c0)=0x48) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0xffff, 0xfe, 0x7, 0x8}, {0x21f, 0x2, 0x2, 0xa994}, {0x7fff, 0x6, 0x1, 0x6ed}, {0x403, 0x2, 0x4, 0x6}, {0x3, 0x2, 0xe7, 0x7}, {0x8000, 0xcb, 0x0, 0x7fffffff}, {0x5, 0x9, 0x3b, 0x8}, {0x81, 0x2, 0x6, 0xfffff89e}]}, 0x10) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000180)) 14:14:37 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)=0x7ff) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x7, 0x400000) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r4 = fcntl$dupfd(0xffffffffffffffff, 0x16a0f9f6d4593a03, r1) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000000280)={0x6, [0x0, 0xfff], 0x398}, 0x10) getpeername$ax25(r2, &(0x7f0000000040)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000240)=0x48) write$P9_RSTAT(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="530000007d020000004c00350b00000080440000000006000000000000000000000098000000200000000500000000000000000000000000190021747275737465645e8f76626f786e65eaa2bd8a2e59de00db7074306c6f6e6f646576"], 0x53) r5 = socket$inet_udp(0x2, 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x1, 0x0) getsockopt$inet_buf(r5, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) recvfrom$rxrpc(r6, &(0x7f0000000100)=""/182, 0xb6, 0x41, &(0x7f0000000200)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) 14:14:37 executing program 0: unlink(&(0x7f0000000040)='./file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x13, 0x0, &(0x7f00000000c0)) r1 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)='vmnet0\x00', 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'rmd128\x00'}}) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x101000, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', r3, ':chain\x00'}) 14:14:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0xd, 0x0, &(0x7f0000000000)=0x7e) 14:14:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f00000000c0)={0x6, 'bcsf0\x00', {0x3}, 0x300}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400042, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000140)=@req={0x6, 0x2, 0x4, 0x1}, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkgy\x00', 0x202000, 0x0) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000080)=0x7) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000180)={{0x2c, @loopback, 0x4e23, 0x1, 'dh\x00', 0x4, 0x4, 0x1f}, {@local, 0x4e23, 0x2000, 0xfffffffb, 0x1f, 0xe25c}}, 0x44) 14:14:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000080)=0x1e3) [ 865.089789] IPVS: set_ctl: invalid protocol: 44 127.0.0.1:20003 [ 865.101485] IPVS: set_ctl: invalid protocol: 44 127.0.0.1:20003 14:14:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x181001, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xf5b, 0x1, [@null, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x3, 0x1, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) 14:14:37 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2a8) getsockopt$inet_buf(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)=0xcb) 14:14:37 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:38 executing program 2: unlink(&(0x7f0000000040)='./file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x13, 0x0, &(0x7f00000000c0)) r1 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)='vmnet0\x00', 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'rmd128\x00'}}) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x101000, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', r3, ':chain\x00'}) 14:14:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000000)={0x9c9d, 0x0, 0x1010, 0x6, 0x0, 0x7, 0x2, 0x1}) 14:14:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) 14:14:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) recvfrom$x25(r1, &(0x7f0000000040)=""/34, 0x22, 0x0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 14:14:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:38 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_buf(r0, 0x0, 0x40c0a5a41094d5dd, 0x0, &(0x7f00000000c0)=0x382) 14:14:38 executing program 0: r0 = socket(0x4, 0x3, 0x4) r1 = socket(0x1e, 0x2, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r3, 0x5}, 0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={r3, 0x9f, "efbfea5b1b3f55af5b65bb0e8c217c8bd793dc1e049f1fa27ef64c801e99a8b66605f9eb5c22d1ff3308721c9fe3bddd103bf26a67d2163c3380073b6bd333fd7aa0a555600e58f40620fbe59fa23020568cd08ff2b6247ce8fb2916d4a17921f3b3214e2247677bcb0a56290bdb7bb29b965de420272fa39274ae920f74e58741b69778ce52cb04c76b1606d31402962381255f011212b094cad35816589c"}, &(0x7f0000000100)=0xa7) r4 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x8001, 0xc8000) ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f0000000240)={0xe, 0x101, {0x57, 0x8, 0x81, {0x254, 0xfffb}, {0x2, 0x1}, @rumble={0x1ff, 0x2}}, {0x2a, 0x2, 0x401, {0x80, 0x4}, {0x20, 0x7}, @ramp={0x1000, 0x2, {0x278, 0x4, 0x3e56, 0x2b}}}}) write$P9_RLCREATE(r4, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x40, 0x0, 0x6}, 0xa4}}, 0x18) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r5, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c09726f75707a69641cd1cd98637600000000000000", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="340000000300000000000000e6ff0000000000000000000013000000000000006b6579c8372a02afb57fbb2b197a05df72697d672c73656c667472757374656400c69306fb66ff94abb31e3f82287309038aa101532c54b874c53936c700"], 0x34) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB], 0x4, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000000)={{0x1, 0x1}, 0x55}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r5}}, 0x120) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000700)={0xb, 0x10, 0xfa00, {&(0x7f0000000640), r5, 0x2}}, 0x18) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2120140}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x2c, r6, 0x2, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040800}, 0x4000) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x21080115}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r6, 0x20, 0x70bd2d, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000001}, 0x20000000) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x10000, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000280)="cfe6c8d827df98a5ec033f6c1103e90c1bf5093c533af260515f8c659ed13032fd1f482388ff48b3f6022a122540c92d08201147193191d1748597d37d41ef2891857631c661175a51a66d37288660c1c957e4aa11be2f42702021265acdbe78100694a5dc020c5aaca9e6f4a838a2425812818465713a2e36d4f92489531dba37fe8f884f2f302aec54a862727947a6b040259b3f5e0e8858cafe66720a97215fdf7df36efbf474973ac093bcf69fc20b3c3b337cb8ad29bb6da2281edaad22913caf0178ee03113f1b51b4", 0xcc, 0x767c}, {&(0x7f0000000480)="7169b6d5c2a66edfb83671028927b41ed56d393db54a5f66cc675ee667c48b9817911de426057486bc9bc661b6305beed6e3e63947eb9a4c3b219c84fb262ca70b9df88d3b3dacef3f43f78bbac4d5b7ca9ff021c63ea22491a1d55bc6f9bd17d2b7373bf39340755c2f53d370bdc323a204ef734b0f78f72aadb1c1507f3b16ff98cc5cfb45419c2f86bdb82872e9cdb8deadb30b4d934cb54f4da786b951be1c795af6f6b00e1578a5f4f56122fcdb632733a86abdcabc7c84d25aaee6d0a8083818a91ed660c9f048e9561eeae0dde8402d6201e9adf4853ddaf37efa3add0ff8b704d5", 0xe5, 0x1}], 0x1010, &(0x7f0000000100)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r2}}, {@type={'type', 0x3d, "91d2810d"}}, {@force='force'}], [{@appraise='appraise'}]}) [ 865.773673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=8453 comm=syz-executor.4 14:14:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r1, 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="9c030000070b080007000000fcdbdf250100000741f02456d49cff0fd35f608844e85f8c717e0e2f907de38f16b8923750260761a5a6c5492baffe797062ef7d25259ed570a6c7195410ef1401cac18915c0fdcfb1745f93c8eac0edc2d8ddcf5d34ccc23d96a0c790c97aea6284b3de42357230aa4c3b8bedc39570323e755d2ec2867e858b64b4b3e333f4e1cfe5ea1bac31ec979bbcf569ff1a93245038130bffd05fb83455b42ec5a8b3b543738fcc0acc131c92e755b058bc754bb20637e1bc887fb3e0e95a0a34fa8e02cac2ab5b7b37acc8022b001400450000000000000000000000000000000000e4f326a27f612b3e9538aadb83add7e9efa850046440d3f91c386c6374e1847c00c52c46cb90e63877616d8f3648619d6df43448bce418faf9a1987638a63ecdd2a3535229f63fd4bec93e7a0906148f982abed954bbf5f268fdfacbb68a1afa56af2c92550a1370dfd45dc63e58d3703fd64ac1f1b006d105e974f7111ffabad4e02a2c5edd1fb9d4fc3424915d49a3b74400b69f18d482e921f203776d30ecaf5c58006e4455195e6ca06ba0e4ef37c880212d66c9fc519e11df10e69e5b746e0b7729d96e6bee0aff2692c7561f17db", @ANYRES32=r3, @ANYBLOB="08006b00040000000c0050000100000000000000f40078007ce9243ed67c0a1d31c213ba49df3fec62273d66e61436719d381e6cf949dabce56550f1aca55a0b9f95fa65f7cf57ca69d5bfa79773e0006660e968d79079eb226f0023745b0eaebb445e1c4726aa3928df7eb95fdda596f703017b74e0d02e67749f016ff4752315891ac6cbd9dc37bdf6cbc07aa298695bb52adbebb8584e358703c8101c158a384d8d80dc632e91a22bab49d88c1574e7e5cd5b373cb01292977523862c03aebb379a3d631741898560e44af88ca7fcfddc5cfb64387e2e2547de089bb1d2d253ecf46f37928e05f5e74bd7e0c9ea5e98d2696bfd5923dfa0f3b9463b3d45980cca45186d1d00000800", @ANYRES32=r4], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) mount$9p_virtio(&(0x7f0000000040)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x200008, &(0x7f0000000180)={'trans=virtio,', {[{@version_u='version=9p2000.u'}, {@access_uid={'access', 0x3d, r3}}, {@loose='loose'}], [{@hash='hash'}, {@hash='hash'}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@appraise_type='appraise_type=imasig'}]}}) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7}, &(0x7f00000002c0)=0x20) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) [ 865.834338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=8457 comm=syz-executor.4 14:14:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB="246e9e67401428239e1f41cf63af2fd8019a7e4172796ffdeb261487ecc8594bcee76829b0e7451b7e52515c0b14d2e3e255fa36d03844c9218030688de9c378c42d5cc734e6ad2482b0"]) setsockopt$inet6_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000040)="b65cf0a975a6eb37e6d94540d874e7029b5703f544fab7575fac1936624bf561c95e8b4c91c9d3a2714d186369c4223fa7741f08508fd4dfef63382e", 0x3c) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="340000000300008400000000006fff78074c82cadf00006578568500000000faffffff7972696e672c73656c66747275737465643315ecc528473b29f5bfe769683f059bd187b714d1bedb55b37d508bc636837c837671d3764da3179cbf76ffbb217ddc72cdbb91dfe5183b6e57106da5c9dc5dc3f9b9c76f4b251a3a04dfbe16ff325e4265c4122c273f7b6081401439f760d35eb5326506aea7a4"], 0x34) [ 865.903355] 9pnet_virtio: no channels available for device syz 14:14:38 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x100) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000100)=0x9) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000040)=""/28, 0x1c, 0x2, &(0x7f0000000080)={0x1a, 0x3fd391095fc112ff, 0xd0, 0x0, 0x7, 0x4}, 0x10) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000440)='\x84\xc1=\xe2\xaaf\\?\xdf1\xa9\x00P\r\x13[(\xdf\x11\n\x93\xb68\xd0[\x8fe\b\xba<\xfc\xdd\x90>\nu\x18G\xbf\xb1!\x1ay{\xe4\t\x13\x7f\x84\x8f\xfe\x0f\xc8\xad\x8e\x15\xcb\xe1)8\xe4\xdc,\xf7\xe5\xd66\x04\xd6o7\xdb\xf4\x1c\x98L\xbe\xbf\x7f/G\x8c\b\x8a\x1a\x1b\f\x1c\xb87\xdaE\x8f\xa5uf\xa5\x87\xacZ\xdf%^w>\x93\xf0(\xca\xd0\xec9\a\xaf\xad\xa3\xb5\xb8\xd8G\xb0M\x89\x19a0\xc0\x1f6H\x0f\xd3^\xebJ\xda\xd2\x7f<\xf5\xb8j\x9d\xb9[=\fdt\xcf\xa0W\x80\"q&\x81\x967\x9f\x12t\x84\x82\x84\xe3\xb6\x98@w\xd9\x8e\x19\xdeW\xd2\xc8t\xde\x1a!\xc0\xa0{U\x80\x92\xb1m\x02\xd5\xcd\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x8, 0x5}, 0x15a) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fstat(r2, &(0x7f0000000680)) fanotify_mark(r0, 0x6e, 0x800000d, r1, &(0x7f0000000380)='./file2\x00') r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000640)=0x48) statx(r4, &(0x7f0000000080)='./file0\x00', 0x0, 0x100, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000600)='./file2\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r7, r8) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000000000000000000000000000000013000000000000006b6579656400"/52], 0x34) r9 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r9, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18, 0x0, 0x2}, 0x18) getsockopt$inet_sctp6_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt(r4, 0x1, 0x34, &(0x7f0000000480)="abb7675b72814712f78c8f7900f97b6094c7257ccd69d0c478677006a2284f2cc07b597a1604334b9ef7ab8196607ca231cf200b5826be54388dec9e04d9c2f29ecad33f6658c6c982fe22fc2b41c6f5a42d9c8c1c40193c5990bfc3c913cc29928ed34598840bef09e3d5d3615ec73dbee3966db1fec6061b7dabe6f45836f3d42f5175907dfc1159ed97688bce82bc0f877f2f228f5670e08051a56abc4fb913ec4831903bb7165586f16e1b31b3411bb56a0ea74d27a076195051038f1506ccd58384928c2dbe", 0xc8) 14:14:39 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:39 executing program 5: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:14:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010200000000000000000f0000000c0047000800010052000000"], 0x20}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1002}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1d0, r3, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7b14}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x147}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x685}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x84}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x915}]}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa495}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x90a8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe0000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x40}, 0x40081) 14:14:39 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0xa526ebe5f80ff43a, 0x0, &(0x7f0000000000)) 14:14:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xaecd8f79d91b5d48, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0xec, &(0x7f0000000080)=""/125, &(0x7f0000000140)=0x7d) 14:14:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfffffffffffffea3) 14:14:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x9) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000040)=0x305) 14:14:39 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(0xffffffffffffffff, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000000c0)=0xfffffffffffffe51) r3 = openat(r1, &(0x7f0000000040)='./file0\x00', 0xd2566d4abcf1e7a3, 0x92) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000080), 0x4) 14:14:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0x1000) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:40 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_buf(r2, 0x0, 0x25, 0x0, &(0x7f0000000000)=0xfffffea8) 14:14:40 executing program 2: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000%0000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, &(0x7f00000000c0)=0x80) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, @default, @rose={'rose', 0x0}, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:40 executing program 5: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:40 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x6, 0x4) 14:14:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000100)='/dev/vbi#\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/166, 0xa6) 14:14:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x80ef99292fced201}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r3, 0x1}}, 0x18) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000840)={0x1, 0x0, 0xe, 0xb, 0x1f8, &(0x7f0000000440)}) ioctl$SOUND_MIXER_READ_RECMASK(r4, 0x80044dfd, &(0x7f0000000040)) [ 867.506460] audit: type=1400 audit(1577110480.216:66): avc: denied { setopt } for pid=8555 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 14:14:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="340000000300000000000000000000000000000000a5cd6f4600000045898b556b657972696e672c73656c66747275a3eba3cb39"], 0x34) 14:14:40 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0x3f8a, 0xa, 0x4, 0x100, 0x4, {}, {0x5, 0x1, 0x8, 0x7f, 0xff, 0x0, "afa9d5b2"}, 0x7fffffff, 0x3, @fd, 0x5, 0x0, r0}) getsockopt$inet_buf(r3, 0x0, 0x11, 0x0, &(0x7f0000000000)=0x10082) 14:14:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0xffaffff, 0xf8, 0x400, r0, 0x0, &(0x7f0000000080)={0x990a72, 0x401, [], @string=&(0x7f0000000040)=0x20}}) connect$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x1, 0x20, 0x1, 0xb3, 0xc0, 0x80}, 0x9}, 0xa) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:40 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000f40)={0x0, 0x1, 0x7, 0x14, 0x6b, &(0x7f0000001280)="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"}) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000010c0)={0x0, 0x20, 0x8000, [], &(0x7f0000001080)=0x1}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r3, 0x0, 0x23, 0x0, &(0x7f0000000000)=0xffffffffffffffc2) r4 = syz_open_dev$evdev(&(0x7f0000000f00)='/dev/input/event#\x00', 0x8, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2a8) fsetxattr$security_selinux(r5, &(0x7f0000001000)='security.selinux\x00', &(0x7f0000001040)='system_u:object_r:ld_so_cache_t:s0\x00', 0x23, 0x3) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r7, &(0x7f0000001700)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000001180)=0x48) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f00000011c0)=""/177) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x54000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000e80)=@nat={'nat\x00', 0x19, 0x4, 0xd98, [0x200000c0, 0x0, 0x0, 0x20000c04, 0x20000e28], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x9, 0x8, 0x2, 'ip6erspan0\x00', 'team_slave_0\x00', 'dummy0\x00', 'veth1_to_team\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xf0702996496bf38, 0x0, 0x0, 0x0, 0x80], @random="212408978e3b", [], 0x98e, 0x9fe, 0xa36, [@among={{'among\x00', 0x0, 0x8c8}, {{@offset, @zero, 0x2, {[0x3, 0xfd89, 0xfffffff7, 0x7, 0x9d, 0x81, 0x1, 0x9, 0x4, 0x1, 0x9, 0x1, 0xfffffff9, 0x6, 0x0, 0xfff, 0xfffffe90, 0x4, 0x7, 0x7, 0x7ff, 0x45, 0x5, 0x6, 0x81, 0x0, 0x2c4, 0x6, 0xff, 0x1000, 0x378b38f5, 0x80000001, 0x2, 0x7ff, 0x1, 0x3, 0x2, 0x200, 0x2, 0x1ff, 0x7fffffff, 0x7fff, 0x6, 0xffffffff, 0x40, 0x8, 0x6713, 0x0, 0x0, 0xd15, 0xffffffc9, 0x4, 0x8, 0x1000, 0xf1d5, 0x81, 0x2, 0x2, 0x9b, 0x7, 0x200, 0x7, 0x9, 0x0, 0xfff, 0x8, 0x114b, 0x2, 0x1000, 0x8, 0x4, 0x6, 0x7fffffff, 0x2, 0x1, 0x1, 0x5, 0x8001, 0x6, 0xbd, 0x400, 0x7f, 0xd, 0x80000000, 0x1f, 0x7ff, 0x3f, 0x8, 0x0, 0xce, 0xff, 0x0, 0x3, 0x562f, 0x4, 0x1f, 0x0, 0x3, 0x101, 0x1, 0x44f, 0x6, 0x2, 0xfffffff7, 0x7, 0x6, 0x7fffffff, 0x102000, 0x10001, 0x10000, 0x0, 0x6, 0x9, 0x4, 0x10001, 0x80000001, 0x8001, 0xffffffff, 0x7ff, 0x800, 0x4, 0xfffffffc, 0x7c, 0x3, 0x4, 0x2, 0x2, 0x100, 0x7fffffff, 0x3f, 0x5, 0x4, 0x4, 0xfffffbff, 0x2, 0x4, 0x7, 0x8, 0x81, 0x3, 0x5, 0x5, 0x8001, 0x4, 0x4, 0x3ff, 0x4, 0x5, 0x101, 0x5, 0x20, 0x1, 0x7ff, 0x7, 0x100, 0x5, 0x0, 0x8, 0x100, 0x0, 0x2, 0x81, 0x5, 0x1, 0xffffffff, 0x7fffffff, 0x200, 0x8, 0x3463737f, 0xee, 0x7, 0x5, 0x3, 0xfffff1fa, 0x101, 0x2, 0x1d33, 0xea, 0x2, 0xfffffbff, 0x5, 0xff800000, 0x2, 0x101, 0x2, 0x548, 0x9, 0x2, 0x3, 0x2, 0x20, 0x80000000, 0x7ff, 0xffffffff, 0x651, 0x4998, 0x2, 0x3, 0x944, 0xa3, 0x2, 0x3, 0x5, 0x2, 0x2318, 0x6, 0x4, 0x6, 0xa, 0x3, 0xffff, 0x40, 0x638224e1, 0x10000, 0x40, 0xffffffff, 0x100, 0x3, 0x4, 0x214, 0x2, 0x8, 0xfffeffff, 0x5, 0x2, 0x1, 0x5, 0x1, 0x20, 0x7, 0x4, 0x6, 0xb1f, 0x2, 0x7, 0x2000, 0x7ff, 0x152147d5, 0x800, 0x3ca6, 0x80000001, 0x0, 0x1, 0xfffffffe, 0x506, 0x6f7, 0x5, 0x4, 0xfff, 0x9, 0x1cb9, 0x80, 0x3ff, 0x9, 0x40, 0x5, 0x8], 0x5, [{[0x3, 0x304d47fc], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[0x4, 0x6], @multicast2}, {[0x8, 0x200], @remote}, {[0x0, 0x4], @empty}, {[0x8000, 0x8001], @remote}]}, {[0xfffffffb, 0xff, 0x0, 0x95, 0x383, 0x3, 0x3, 0x2, 0x8, 0x7ff, 0x437, 0x3, 0x0, 0x4, 0xf0, 0x60f, 0xf3, 0xfffffff8, 0x2, 0xffffff98, 0x9, 0x2, 0x0, 0x2, 0x101, 0xe367, 0x10000, 0x603b, 0x2, 0x7, 0x0, 0x9, 0x0, 0xff, 0x2, 0x6, 0x4, 0x7fffffff, 0xffff0000, 0xfffffffc, 0x7, 0x4, 0x81, 0x8, 0x0, 0xffff, 0x8, 0x10001, 0xf8e1, 0xb7, 0x3, 0x4, 0x10000, 0x10001, 0x12b1, 0x40, 0x1000, 0x4, 0x4d, 0x10001, 0x3ff, 0x8, 0x50ef, 0x7ff, 0x0, 0xe1d5, 0x5, 0x5, 0x4, 0x9, 0x3f, 0x7, 0x0, 0x1, 0x0, 0x5, 0x5, 0x9, 0x4, 0x0, 0x2, 0x0, 0x1ff, 0x7, 0x8, 0x4, 0x0, 0x6, 0x7, 0x1, 0x64, 0x80000001, 0x2, 0x80, 0x80, 0x0, 0xffffffb8, 0x0, 0x4000000, 0x9, 0x1, 0x7, 0x6d4, 0x7fff, 0x3f, 0x0, 0x80, 0x6, 0x1, 0x4, 0x7, 0x3, 0x8, 0x1, 0x7ff, 0x4, 0x1ff, 0x4a8, 0xd031, 0x0, 0x3, 0x40, 0x6, 0x400, 0x1000, 0x1f, 0x5, 0x0, 0x0, 0x80, 0x20d, 0x5, 0x5, 0x8, 0x4, 0x8, 0x9, 0x2, 0x6, 0xfffffffe, 0x0, 0x100, 0x8, 0x7f, 0x363, 0x6, 0x6, 0x2, 0x7, 0x2, 0x2, 0x9, 0x9, 0x7, 0xffffffde, 0x0, 0x1, 0xbb20, 0x8000, 0x0, 0xb53, 0x8, 0x2, 0x6d90, 0x8, 0x3, 0x7, 0x4d49, 0x8, 0x1000, 0x80, 0x6, 0x8000, 0x400, 0x3, 0xffffffff, 0x2, 0x0, 0xfffffffe, 0x4, 0x4, 0x3, 0x6, 0x8, 0xcfab, 0x7c, 0xcab4, 0x0, 0x3, 0x401, 0x81, 0x10001, 0x0, 0x200, 0xffff7fff, 0x20, 0xfffffff7, 0x40, 0x80000001, 0x40, 0x7fff, 0x9, 0x100, 0x9, 0x5, 0x5, 0x8, 0x2, 0xc8, 0x75, 0x6a8a32e9, 0x8020, 0x6, 0x0, 0x4, 0x6, 0x2, 0x3ff, 0xfffffff7, 0x35b6, 0x7, 0xffffbec9, 0x7, 0x4, 0x4, 0x3, 0x7, 0x3, 0xffff7fff, 0x800, 0xffffffff, 0x8, 0x1ff, 0x8, 0x1, 0x6, 0x3, 0x2f, 0x7000000, 0x1, 0xd, 0x7, 0x27, 0xfa91, 0x7f, 0x4, 0x2, 0x2, 0x6, 0x81, 0x3, 0x101, 0x6, 0x2, 0x0, 0x3ff, 0x1], 0x9, [{[0xb89, 0x5b], @multicast2}, {[0x7ff, 0x4], @dev={0xac, 0x14, 0x14, 0x1b}}, {[0xfffffffb, 0xaf], @dev={0xac, 0x14, 0x14, 0x10}}, {[0xf92, 0xf0d], @dev={0xac, 0x14, 0x14, 0x26}}, {[0xfca, 0x101], @multicast2}, {[0x20, 0xfffffff9], @multicast1}, {[0x69080000, 0x100], @dev={0xac, 0x14, 0x14, 0xb}}, {[0x8, 0xffffffff], @multicast2}, {[0x0, 0x3], @multicast1}]}}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0xff}}}], [@snat={'snat\x00', 0x10}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}}, {0x9, 0x0, 0x1c, 'lo\x00', 'veth1\x00', 'ip6erspan0\x00', 'gretap0\x00', @empty, [0xff, 0x7f, 0xff, 0x0, 0xff, 0x80], @random="97ebb1d6dd5a", [0x1a21721093fffe63, 0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffc}}}], @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{0x3, 0x4, 0x16, 'ip6_vti0\x00', 'netdevsim0\x00', 'sit0\x00', 'veth0\x00', @random="6ddfa5dadd81", [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0x0, 0x0, 0x0, 0x0, 0x101, 0xff], 0x6e, 0xde, 0x116, [], [@snat={'snat\x00', 0x10, {{@dev={[], 0x11}, 0xfffffffffffffffe}}}, @snat={'snat\x00', 0x10, {{@random="085ca342ce27", 0x10}}}], @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}}, {0x9, 0x10, 0xe863, 'ip_vti0\x00', 'syzkaller0\x00', 'ifb0\x00', 'nr0\x00', @empty, [0x0, 0x0, 0xff, 0xd6a4c06598b44711], @remote, [0x0, 0xff, 0x0, 0x1fe, 0xab3fdaaeab9dd7ad], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@random="a2e529f91f66", 0xfffffffffffffffe}}}], @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}]}, 0xe10) [ 867.805676] audit: type=1400 audit(1577110480.516:67): avc: denied { relabelto } for pid=8591 comm="syz-executor.0" name="UDP" dev="sockfs" ino=116859 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ld_so_cache_t:s0 tclass=udp_socket permissive=1 14:14:40 executing program 2: r0 = socket$inet6(0xa, 0x202000000802, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$inet(r0, &(0x7f000000adc0)=[{{&(0x7f0000000400)={0x2, 0x4e23}, 0x10, 0x0, 0x0, &(0x7f0000001540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @multicast2}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) 14:14:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0xffffffff, 0x8000}) 14:14:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2a, 0x0, &(0x7f0000000000)) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0x9a0000, 0xffffff7f, 0x7f, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x980908, 0x1f, [], @p_u32=&(0x7f0000000040)=0x69d}}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000100)={{0x2b, @rand_addr=0x4, 0x4e21, 0x3, 'lblcr\x00', 0x1, 0x1, 0x26}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x0, 0x1, 0x8, 0x9}}, 0x44) 14:14:40 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x159, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008104e00f80ecdb4cb902020000040e000000810040fb12000100040fda1b40d819a906000500000f", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) 14:14:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x104000, 0x0) getpeername$tipc(r4, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) 14:14:41 executing program 5: timer_create(0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0xd94145d2870b2edc}], 0x1) 14:14:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xffbf) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0xffffffffffffff87) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) close(0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1004cc], 0x12000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000100)=""/130, &(0x7f0000000000)=0x82) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:14:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000440)={{0x2, 0x2, 0x60000, 0x80000001, 'syz1\x00', 0x7f}, 0x1, [0x1000, 0xb1, 0x6, 0x3ff, 0x81, 0x587631bd, 0x362, 0x233c, 0x80, 0xff, 0x0, 0x8, 0x1, 0x2, 0xd3d, 0x60f6, 0x2, 0x5, 0xfffffffffffffff8, 0x705, 0x3, 0xffffffffffff8000, 0x5, 0xfffffffffffffffd, 0x1ff, 0x3, 0x5227, 0x6dd7, 0x1, 0x0, 0x7ff, 0x0, 0x27d9, 0x2, 0x9, 0x8000, 0x9, 0x200, 0x2, 0x1000000, 0xfffffffffffffff7, 0x7ff, 0x909, 0x1, 0xebc, 0x3ff, 0x3ff, 0x8001, 0x8, 0x5, 0x8000000000, 0x4, 0x80000001, 0x164, 0x2, 0x200, 0x2, 0x6, 0xffffffffffffffff, 0x5, 0x1, 0x1000, 0x2, 0x5, 0x5, 0x1000, 0xd0, 0x24ef, 0xe4ce, 0x401, 0x5, 0x8001, 0x0, 0x7, 0x6, 0x3, 0x100, 0xfffffffffffff479, 0x9c, 0x0, 0x81, 0x200, 0x5, 0x3ff, 0x3, 0x2, 0xaa, 0x7fffffff, 0x3, 0x40820e35, 0x100, 0x7fff, 0x8, 0x2d4, 0x8001, 0x755, 0x1fe3, 0xef43, 0x5, 0x9, 0x0, 0x6, 0x8001, 0x8, 0x7fff, 0x6, 0x7f, 0x80000001, 0x400, 0x6, 0x4, 0x5bc, 0x200, 0x7f, 0x7fff, 0xffffffffffffffc0, 0x9, 0x1, 0x800, 0x0, 0xffffffffffff8000, 0x7, 0x8, 0x8, 0x4b, 0x8000, 0x7f, 0x9]}) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0xf) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000140)=0x48) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f00000000c0)) r4 = request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='/em1\x00', 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)='/selinux/avc/cache_threshold\x00') r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$RDS_RECVERR(r5, 0x114, 0x5, &(0x7f0000000080), 0x4) [ 868.378750] kvm: pic: non byte read [ 868.386422] kvm: pic: non byte read 14:14:41 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "43a1275fda49936e0de66653a0ea82539a051b"}, 0x14, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75701301428599ff5a33b3a0d6865f69643d", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="3400000003000000000000000000000000000000000000001300ba0000000000006b65ff7f696e672c73656c667672757374656400ece77008f0a3e41fba0517f7c89d830ad63f2cf3217b6db3f5d82834ef136d97dc0df11c44fe4517cda6b74be7b1fdbe0b7727a3ee019434824c34d4d9eb38312416ecae2a1932e46cde479ce881700000"], 0x34) lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "a6ad8432fd763848072050f32bace9"}, 0x10, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000400)={0x0, @l2={0x1f, 0x4, {0x1, 0x0, 0x8, 0x9, 0x5, 0xff}, 0x101, 0xeb}, @nl=@unspec, @xdp={0x2c, 0x1, 0x0, 0x9}, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0xb9b6, 0x7}) setsockopt$inet6_mreq(r1, 0x29, 0x21, &(0x7f0000000480)={@mcast2, r2}, 0x14) 14:14:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xffffffffffffff0b) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0xffffffffffffff87) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x10001, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L-', 0xc6}, 0x16, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x81, 0x0, 0x1000000000000000, 0x1004cc, 0x0, 0x0, 0x0, 0x81], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000100)=""/130, &(0x7f0000000000)=0x82) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:14:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) 14:14:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1004cc], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000100)=""/130, &(0x7f0000000000)=0x82) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:14:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) 14:14:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair(0x1, 0x4, 0xb6, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f00000004c0)={0x8, 'vcan0\x00', {'veth1_to_bond\x00'}, 0x100}) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={[], 0xa}}, 0x14) getsockname$packet(r3, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) sendmmsg(r2, &(0x7f0000005d40)=[{{&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x4, 0x3, 0x1, 0x1, {0xa, 0x4e21, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}}, 0x80, 0x0}}], 0x1, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20080, 0x0) ioctl$KVM_GET_LAPIC(r7, 0x8400ae8e, &(0x7f0000000080)={"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"}) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) [ 868.710111] net_ratelimit: 16 callbacks suppressed [ 868.710116] protocol 88fb is buggy, dev hsr_slave_0 [ 868.720207] protocol 88fb is buggy, dev hsr_slave_1 [ 868.725377] protocol 88fb is buggy, dev hsr_slave_0 [ 868.730519] protocol 88fb is buggy, dev hsr_slave_1 14:14:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="e637726f75705f69643d", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:41 executing program 2: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000300)=[{0x0, 0x7}, {}], 0x2) semctl$GETPID(r0, 0x0, 0xb, 0x0) 14:14:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xffffffffffffff0b) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0xffffffffffffff87) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x10001, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L-', 0xc6}, 0x16, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x81, 0x0, 0x1000000000000000, 0x1004cc, 0x0, 0x0, 0x0, 0x81], 0x12000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000100)=""/130, &(0x7f0000000000)=0x82) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:14:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x4) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='*eth1+\x00'], &(0x7f0000000180)=[&(0x7f0000000100)='/dev/vbi#\x00', &(0x7f0000000140)='em1:\x00'], 0x400) 14:14:42 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x9, 0x0, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) 14:14:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) 14:14:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x53, 0x5, 0x2, 0x0, 0x0}, 0x3c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x20820000, r1}, 0x2c) 14:14:42 executing program 5: unshare(0x20600) r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) 14:14:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) 14:14:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) fsetxattr$security_smack_transmute(r0, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0xff, 0xffff282e}, {0x8318}], r1}, 0x18, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000003c0)=r3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x158) ioctl$USBDEVFS_GETDRIVER(r4, 0x41045508, &(0x7f0000000080)={0x120, "6e31469f6abf06ebf9d649567c60a2a4e2dd2f2d67c44bd1ad83594b34debdca08d1595f0a17c8e521c07f53f0edb3a5b2a9df9342a97de921027ec5583d8524bbdf26ad4ebed85ab2adfcda86b48e176dad5ef305fa678a32faf2ad7288935eab52428b0c8568b07218e2959619502778233e0df028792f3e878db12371c7e8835b48c22cdcc886bff01ffe3f2c7bc9200ec7402ba5a17e71e2ec30872b1157785cce662415f3c426ece27bc57636039a32bcc26eb039550e70601abfb28e906eabbd71d45f3a2e70760e836e480f3bff08d88559a7a75329cef846db61400723d729f190d50bb09ace7805d7550177510eaa20aa47e33f15391496fcf8060f"}) 14:14:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x1}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}, 0xe) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0xe, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:14:42 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x400, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000053000000000000000000000000000093000000000000006b657972696e672c73656c667472757374656400"], 0x34) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x6, {{0x2, 0x4e24, @empty}}}, 0x88) [ 869.910123] protocol 88fb is buggy, dev hsr_slave_0 [ 869.915352] protocol 88fb is buggy, dev hsr_slave_1 14:14:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:14:42 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_buf(r0, 0x0, 0x27, 0x0, &(0x7f0000000740)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="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"/1765], 0x6e5) 14:14:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:42 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x1}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x4}, 0xe) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0xe, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:14:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x2000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xff, 0x1, 0xc, 0x2000a, 0xfffffffb}, 0x14) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$unix(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) flock(r3, 0x6) 14:14:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) ftruncate(r1, 0x1000000) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000440)=""/4096, &(0x7f0000000140)=0x1000) sendfile(r0, r1, 0x0, 0xeefffdef) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @dev}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', r6}) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r4, r7, 0x0, 0xeefffdef) 14:14:42 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') 14:14:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=0000000000,uue\t\x00\x00\x00=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="e6fc0000030000000000000000000000000000000000004022feffff00000000667573650000"], 0x100000176) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, 0x6, {0x1}}, 0x18) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000040)) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f00000001c0)) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000180)=0x6, 0x4) 14:14:42 executing program 5: ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1f, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d146300b21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a98967404ccb30e7f63a1b51ec00900", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x38, 0x6}}, 0x20) 14:14:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x58, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x30, 0x16, [{0x2c, 0x1, [@IFLA_VF_MAC={0x28, 0x9, {0x0, @random="c700f7000016"}}]}]}, @IFLA_GROUP={0x8}]}, 0x58}}, 0x0) 14:14:43 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cachefiles\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB="cb4a4f74", @ANYRES16=r2, @ANYRES16=0x0], 0x3}, 0x1, 0x0, 0x0, 0xc1}, 0x28008008) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000140)) r5 = gettid() tkill(r5, 0x3c) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0xf4844, 0x0) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r6, 0x0, 0x10, &(0x7f0000000040)='/dev/cachefiles\x00'}, 0x30) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r10 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r10, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r11 = openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x410100, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r8, 0x7, r9, &(0x7f0000000100)={r10, r11, 0x1}) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000400)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x2a8) getsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, &(0x7f0000000000)) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyprintk\x00', 0x6800, 0x0) 14:14:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='0'], 0x1) 14:14:43 executing program 2: socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x58, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x30, 0x16, [{0x2c, 0x1, [@IFLA_VF_MAC={0x28, 0x9, {0x0, @random="c700f7000016"}}]}]}, @IFLA_GROUP={0x8}]}, 0x58}}, 0x0) [ 870.346722] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 14:14:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 870.462472] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 870.480102] protocol 88fb is buggy, dev hsr_slave_0 [ 870.485207] protocol 88fb is buggy, dev hsr_slave_1 14:14:43 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x64002a}) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10J<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1\xc2[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x05\xe1)h\a\xe8Wn]\xe4') gettid() setuid(0xee00) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 14:14:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000040)={0x9c0000, 0xbce, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0xd202b6615276156, 0xffffffaa, [], @ptr=0x8}}) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) 14:14:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x7fffffffffffffc9, 0x2, {0x5}}, 0x18) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000002380)=ANY=[@ANYBLOB="7220cc22aec049f37f5e42da69a5c66371998fafdf4c1bc6438806bddccdc17fcc03418efd8309acea7e2bb3c8c26c725155256158f52e613a6a4b7c0feb52b132671d77bc182a5942fac0af8af2cd5095448c0a7eae18aedb14397a0d8d8687a260d93b7563b62eb475d780443def956104515957e27ddafc6bc3303e80464fb5f61366bf554cb1132a403459c7aac1b80515cbd19bdcabe9b7c69eefa1635e5c4b1d612f14b021d472d2a1936963ae008ef3d81478a9386ff48b0bd71b05005c51c4d9b7d49a37fe17b75d"], 0xcc) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x811, 0x0, 0x140) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0xc000, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 14:14:43 executing program 4: write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000180)={0xc, {0x5a, "78680c4555e70f3a63eb47b65d574ebfa3959a5b51f571cdf7af431da5c4cbb42f8b2af08374ff455188cf63776008db9627a5829d7aa097fb0df6f9b900536e4f89466829575c253e621b5c270c68afc2c67ace0d1c9f226b63"}}, 0x60) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0xffffffffffffffa6) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='nd-', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="34000000030000000000000000000000000100000000000013000000000000007b657972696e6f2c73656c6674f875ce0dfbd48fdf513bab9b7a57cf64757374656400"], 0x34) 14:14:43 executing program 2: writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000040)}], 0x1) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000300)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000001c0)=""/246) dup3(r0, r1, 0x0) 14:14:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x23, 0x0, &(0x7f0000000000)) 14:14:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_buf(r2, 0x0, 0x30, 0x0, &(0x7f0000000080)=0x129) ioctl$FBIOPUT_CON2FBMAP(r1, 0x4610, &(0x7f0000000000)={0x2b}) 14:14:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 14:14:44 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/devoocfs2_control\x00', 0x240000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}}) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, 0x0, &(0x7f0000000000)=0xffffffbb) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000180)=0x1, 0x4) 14:14:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x141) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRESDEC=r0, @ANYRESDEC=r3, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRESHEX], @ANYBLOB=',group_id=', @ANYRESHEX]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000000c00000040000000e4ff00000013000000000000006b657972696e672cb7d75073946c667472757374"], 0x34) 14:14:44 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:44 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SOUND_MIXER_READ_RECSRC(r0, 0x80044dff, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x201) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r5, 0xc0984124, &(0x7f0000000100)) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x1, 0xfffffffffffffff8}) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x16) 14:14:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000532000/0x3000)=nil, 0x3000, 0x11) 14:14:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\x00\x00\x00\x00\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr\xbc\x9e\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f00000000c0)={0x7fff, 0x3}) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40, 0x200) r5 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f0000000080)={0x6, 'veth1_to_hsr\x00', {0xfffffff9}, 0x2}) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000040)) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:44 executing program 2: writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000040)}], 0x1) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000300)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000001c0)=""/246) dup3(r0, r1, 0x0) 14:14:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000532000/0x3000)=nil, 0x3000, 0x3) 14:14:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6cbc8b3d33ea22030164653d3030303030303030303030303030303030303430303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x8000, 0x0) fsync(r1) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x3000}) 14:14:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() tkill(r0, 0x38) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0x14, &(0x7f00000000c0)=0x3f365342, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0xd4) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000000)=0x6bc, 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 14:14:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = dup2(r1, r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x879e5cd08084d292}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x48, r5, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0xc0006}, 0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f0000000300)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4161ae", @ANYRESHEX=r0, @ANYBLOB='(rootmode=00000000000000000040000,user_id=', @ANYRESOCT=r6, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:44 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e0000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = socket(0x2, 0x2, 0x0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) r2 = socket(0x2, 0x8002, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="620202080011e0000068"], 0x10) write(r2, 0x0, 0x0) 14:14:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, [{0x4}]}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:14:45 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 14:14:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) getcwd(&(0x7f0000000000)=""/200, 0xc8) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/9, 0x9}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00559) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r2, 0x0, 0x5744, 0x2, 0x0, 0x800e0054f) shutdown(r3, 0x0) 14:14:45 executing program 0: r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'rmd128\x00'}}) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae720b872d4b7828e3b48522c673aa6cb366d4201e2aee3261eb52da262b1f", 0xf4, r2) r3 = pkey_alloc(0x0, 0x2) pkey_free(r3) r4 = pkey_alloc(0x0, 0x2) pkey_free(r4) keyctl$unlink(0x9, r0, r2) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r5, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0xe0, 0xe0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', {}, {0x1fe}, 0x0, 0x2}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x800, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:45 executing program 5: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/40, 0x28}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000080), 0x100000000000028a) shutdown(r4, 0x0) shutdown(r2, 0x0) 14:14:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x212082, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_mr_vif\x00') ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000140)=0x3) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000080)={{0x2, 0x4e24, @loopback}, {0x306, @remote}, 0x50, {0x2, 0x4e22, @empty}, 'bridge_slave_1\x00'}) 14:14:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=0x0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYBLOB="970074ed614be45640680299b710ba6c9fddddeba46a74b395f95a"], @ANYBLOB="2c67726f75705f696f3d5561547774b9aa307afe0c3cde76cb3c78c84ee392745fae943038a81fb2a6d995fc1549d7a283dc4f1cbfd25f6c1eed19a996d228d8defa58aced8734468a46cbdbdd400a8dc84a4ee0e6a7fc1fd5062ce6f81958724a3d3e0f44dc390da5cccc025a61c334ee1cb2f6f05ebada9585bae0db25aa56363e45fe8f688505e0076795b538df2b10544995a3262e9b041e9ff0a8b22ec1e7c07a7039a4c9416525054f4c6b1ee34db318b1c8e8fe26df81ce1c3ceae0ea1a25e0365d670b445f61b9f10caefd4d2184924dee17a1017437141cd1b474beb04578160f37c3e8", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0xfffffffffffffdff, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2a8) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$USBDEVFS_RELEASE_PORT(r2, 0x80045519, &(0x7f0000000080)=0x9) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000040), 0x10) 14:14:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x881ed53fb6164b65) getsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) sendmmsg$inet6(r3, &(0x7f0000002600)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x9, @ipv4={[], [], @multicast1}}, 0x1c, &(0x7f0000000280), 0x0, &(0x7f0000001d80)=[@hopopts={{0x28, 0x29, 0x36, {0x5e, 0x2, [], [@enc_lim={0x4, 0x1, 0xf1}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @ra={0x5, 0x2, 0x9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @hopopts={{0xa0, 0x29, 0x36, {0x0, 0x10, [], [@calipso={0x7, 0x40, {0x6, 0xe, 0x3, 0x9, [0x80000001, 0xffff, 0x8, 0xc6e3, 0xffff, 0xfff, 0xa4e]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x400}, @enc_lim={0x4, 0x1, 0xfd}, @calipso={0x7, 0x30, {0x8, 0xa, 0x1f, 0xbd, [0x400, 0x400, 0x1, 0x4e1, 0xec4]}}]}}}], 0xe0}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty, 0xd515}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)}, {&(0x7f0000000400)="91e68e343f0f451270a711c3b4df8201cf", 0x11}], 0x2, &(0x7f0000000600), 0x68}}, {{&(0x7f0000000680)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x571daff8}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000d80)="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", 0x1000}, {&(0x7f0000000740)}, {&(0x7f0000000840)="6a450ae7929013d2a8ec72a23e9751a82b0565ae7288065ddec49ea252bd384c9e26c1f12dc0cd9709691bf6c087602330c4cdd47b7690f399a92f6dcf46ca3a0364f79ab267ccff85e7b709d5fa081835e9834969ede28b4929d4f8c153214d992edbbbf1f3077ff792d1f2afde70199c8a28d9c3b85e9188dd9494902ba1fd20487acd0c0b38d5af84804a39b0d7d2b54e439dd2b17d0460dcbf63b35c5c629ee2477d402770f9b727294578bec05eab9d31c4f9", 0xb5}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/463, @ANYRES32=r4, @ANYBLOB], 0x217}}, {{&(0x7f0000000d00)={0xa, 0x4e20, 0x0, @remote, 0xefdd}, 0x1c, &(0x7f0000001f40)=[{&(0x7f0000001d80)}, {0x0}, {&(0x7f0000001e80)="95625d6469be24556962472f7ce3b4b4b5ba763e3c6e1aa3598bf4e47182226d9b20fafb", 0x24}, {&(0x7f0000001ec0)="b9c71c3a0ea94bef2f823d9fba571b98a1bdbcc6c66ae89f424fe5930fc447210132141403973da6bd588c17a5cf0ec42553a3987488a4d181764ea2", 0x3c}], 0x4}}, {{&(0x7f0000001f80)={0xa, 0x4e24, 0x9, @empty}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000001fc0)="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", 0xff}, {&(0x7f0000002140)="a2e5917bc44da94b877617b83143cbc459f8682c07c0a2f04754fbc484e9f3cca6a669e7566a736d4ae2ee6c5aa011fb132bcc4c3e01d8128b91a95f2226db2e504e59947639c2a3ce9a23e9f747ecc6ae6b638fc24c9a5f0a01a54970978252f83b7da5d4e1797cb01b2fe1a881a9ed1a178927dd73c57077ca97ecb6035c5afceb7ccf72f56dbd4679d41f791727d126e972d63312b94d369b479cc86ee9ea02f75dbdb7", 0xa5}, {&(0x7f0000002200)="fcbe725b50f65d8d221f46273250e582805e53680f257beeca3e212a05546030339136660dd901bedbca1f545d736dee45a2791441495fd557eadc08e99e544d23f2805ca9d853e4ac99b0d23ca619b4aaa10a91c6a57cd2fdce6ea31eedbcd9d51f765f60a74f76e89dd0880197", 0x6e}, {0x0}, {&(0x7f0000002380)="45db0f5ce8fb4319412fd49d64f1c19ee85a3eb8af73f66ffad07199", 0x1c}], 0x5, &(0x7f0000002580)=ANY=[@ANYBLOB="40000000000000002900000036000000a004000000000000c910fe8800000000000000000003000000000000000000000000000000000000000000010000000024000000000000002900000032000000fe800000000000000000000000000092", @ANYRES32=0x0, @ANYBLOB="00000000140000000000000029000000430000000300000000000000"], 0x80}}], 0x5, 0x40000) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000080)=r4) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x39) r6 = socket(0x2, 0x6, 0x80) r7 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp1\x00', 0x200, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r7, 0x800c5011, &(0x7f0000000280)) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r9 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r9, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r10 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r11 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r11, 0x1000000) sendfile(r10, r11, &(0x7f00000000c0)=0xf18001, 0xeefffdef) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) r14 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r14, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$VIDIOC_PREPARE_BUF(r10, 0xc058565d, &(0x7f0000000500)={0x8000, 0x5, 0x4, 0x80000, 0x3a5f, {r12, r13/1000+30000}, {0x3, 0x2, 0x0, 0x9, 0x7f, 0x80, "208d1bd1"}, 0x8, 0x1, @fd=r14, 0x100, 0x0, r3}) getpeername$ax25(r15, &(0x7f0000000580)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000600)=0x6b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000000c0)={0x1f, 0x1e, 0xffff, 0x0, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000002900)=ANY=[@ANYRES32=r16, @ANYBLOB="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"], 0xe8) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x186}, "612756ddb833ef24", "3aba1c789906877337e655a752a0e0c6", "d3a9ff93", "cf02d961db36fda6"}, 0x28) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:45 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000300)) write$binfmt_aout(r0, &(0x7f0000000480)={{0x10b, 0x7, 0x0, 0x27, 0x9c, 0x4, 0x373, 0xffffffff}, "3be6b2db5f4015752e7692c877b717dfbea109610a83b7614881ed76103e51927e9193afa9ac609f22620b850a4ad3aa522174b39f9a015cd724d13475b0aad859f449f074187a8c9bb68f923670c99f114c105c4230d261eaf89d48e6d668c81668a48ff7c3e77c1e844e59f04a2a796156b06ed979db148a18a4a394fa102e3113aaf788a9169a02776f3296b257024b88fc16fba9f62bab83aac0d208ecd9deda85a385894edf63e4b2838bcfdab685fdeb5f494ea04ba89b7762b209a1d6d474a1323e9e", [[], [], [], [], [], [], [], []]}, 0x8e6) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:45 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcdbb, 0x0, 0x0, 0x800e0075d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00517) shutdown(r1, 0x0) 14:14:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000280)={0x0, 0x0, {0x9, 0x4, 0x3010, 0x0, 0xa, 0x3, 0x0, 0x5}}) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0x85) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303057eb64c0a98b65725f8869643dd55a1dfdb9bddc09e4d56d8935807afd0000000700000000000000000000c2ba34ac69a00dc5b2a274aaf79c66a199d9c12ea6ac69700c33f8d231c0108eb129563325e06e251f7e64820fa31644fad0bec4af7febb1023f9c6e57cca4ee2577d195e2d8fc6fe9ebae84310c09f92333823292b9f63324e96b9e0957fea91f30637013244c3e41c1e5b04312e94c1cbd90ff82783470e456b04eb041f8a855db627b8e92891950fa9bce5a41d723dd8701fae3b0a2f9f903fc3872a9ac6a1328236460c10000000000000000", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d5d3b757604d86aa4a5fbc1e33ed46eff", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="3400000003000000ff7f000000000000008000000000000013000000000000006b657972696e672c73656c667472757374656400307a0600217d53b954f7ac594c44b9f7ccf78aba5f2eb471a2d9b5669ce73ddea2235c6626beb21ba9860a8e87c71a133ebd6fae01bb15f4b8833fc63b58715b3763747792a6356d8644d668ffbe4195be5a25203d44beb6d6be844757cf31ee19f7917072772a350bebd294e81e89cba2f6c55f85366657b512080db095f6d6c8fe42495e0c8539c108c2c9ae01d39bf05a275a398502c0"], 0x34) 14:14:46 executing program 1: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000000)) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) 14:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000140)=[{}, {r0}], 0x2, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x35b1fb9b03bbddb0, 0x0, 0x0, 0x800e00806) poll(&(0x7f0000000040)=[{}], 0x20d6, 0xffff) shutdown(r1, 0x0) 14:14:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000340)={r2, 0x20}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, 0xffffffffffffffff, 0x12b) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) write$binfmt_misc(r4, &(0x7f0000000080)={'syz1', "83e9b98eefdfa15b0dfe537788fa817c91d2a68af78bd878ef398a8fac3a8c9d07ec9e748db32995ccbfd4e1aa1e8d64a740da44f30697a897333dd6c875c4b690739a1f9a42c6f901a4ab44f0b0576b371dc4979353358167205d47cda694afe9c3d7cde76cb02317684476563c3b76db9587fc7b0574aa5965e6e9617cef257711d6d5fceb68"}, 0x8b) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000680), r5}}, 0x18) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r6, 0x7706, &(0x7f0000000380)) chroot(&(0x7f0000000040)='./file0\x00') 14:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000140)=""/152, 0x98}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/10, 0xa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000080), 0x100000000000028a) shutdown(r4, 0x0) shutdown(r2, 0x0) 14:14:46 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f00000002c0)={0x1, 0x8}, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='@\x00', &(0x7f0000000300)='vmnet0&+vboxnet0em1\x00', &(0x7f0000000100)='\\\x00', &(0x7f0000000140)='systemposix_acl_access\x00'], &(0x7f0000000280)) 14:14:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000180)=@rose) setsockopt$inet_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000080)="2b87021a58d9b7a1f56ff4e7bd58671bf7041811abb0b6cedcf9f9db2115f7d82ecc8f768320fe0cc5492b4464094d7f0184f4ae1688d14777d4181367e6783959e06e06d9ead8baa23d5a2b3c161cda8f562f8b44b6569318ae52b2cf0ac12ba1224830e5285be2d168a7b77f0e89e180deb309baf3ef66aaf8f832b80f3404215c02692f9aa85ac8016c1718", 0x8d) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a0000005236b2890000008000000000daf606aeac651019ce1356c4b80a"], &(0x7f0000000200)=0x22) unlink(&(0x7f0000000140)='./file0\x00') getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:46 executing program 0: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x800) pread64(r0, &(0x7f00000000c0)=""/161, 0xa1, 0x5) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) 14:14:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000000)=0xfde4) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet(0x2, 0x0, 0x7f) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f0000000980)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x120, 0x0, 0x120, 0x120, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x0, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0xca4, 0x9, [0x3f, 0x33, 0x35, 0x2c, 0x4, 0x20, 0x37, 0x1b, 0x5, 0x1e, 0x30, 0x19, 0x2e, 0x3f, 0x3c, 0x15], 0x1, 0x9, 0x5}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x400, @remote, 0xfffc, 0x0, [0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22], 0x0, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x1ca) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000040)={@multicast1, @multicast1, @rand_addr=0x4}, 0xc) 14:14:46 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x200, 0x90, 0x90, 0x0, 0x0, 0x90, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbe\x00', {}, {}, 0x0, 0x1}, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x20, 0x5, 0x800, 0xff, '\x00', 'syz1\x00', {0xff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) getsockopt$inet_buf(r1, 0x0, 0x28, 0x0, &(0x7f0000000080)=0x202) [ 873.916004] x_tables: ip_tables: NOTRACK target: only valid in raw table, not raw” [ 873.928935] x_tables: ip_tables: NOTRACK target: only valid in raw table, not raw” 14:14:46 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 874.070133] net_ratelimit: 18 callbacks suppressed [ 874.070140] protocol 88fb is buggy, dev hsr_slave_0 [ 874.080309] protocol 88fb is buggy, dev hsr_slave_1 14:14:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894Y\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x13\nMCi|+\xcdw\xf0\x176Z\x05S\xed\x85;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\x11\xfdG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xdf\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000280)=0x202, 0x4000000000dc) 14:14:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000200)='\xd4\xb1\x10\x86\x8b\x06p\x16\x10\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x200000, 0x0) write$midi(r4, &(0x7f00000000c0)="8440b35877b5f3b9934a5dee9092fe60228bb388cef97e962c2ba02ffee9887ad3be67e677ffe9b16ffb3ae299beb9f605c56f3c7c6f17639313cb5801bb847f8352c582fa585ae9cc7af4fa0956dc93cc774e77033a9c9866e70d32e021e2ea2e0cff622a469b01745731aa0269fc6ce2c536d2fc5278cbe92574e1acfb4e8d1c291252217d0e863e509133f0599b1c195b369f598d7418cab23b7dbeba9639f5c7409ab46576ef5fc5aba3aa20f6e6cccc50b0a2382c644a5d0972ce29abf287", 0xc1) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000440), 0xffffffffffffffff, 0x4}}, 0x18) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x3000, 0x0) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000040), 0x2) 14:14:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_keyring_id(0x0, 0x0, 0x1) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff030000000000", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3}}, 0x0) 14:14:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196a4", 0x62, 0x0) keyctl$get_keyring_id(0x0, r5, 0x1) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff030000000000", @ANYRES32=r7, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600"], 0x3}}, 0x0) 14:14:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:47 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100802, 0x0) r1 = socket(0x1e, 0x2, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$FUSE(r3, &(0x7f0000000400), 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000001400)=ANY=[@ANYBLOB="00000000b3f78a08ebab64487a57019e9983eb8e5681d5fcd9e923c398cb8fbb8dbe01e1dc0655c09132876d9bb5d6ad5699fb86176fa02a9ad279daa651906214126b4256a289f91ba5802eec3f2da3a8069c147eca6ffeb31712ec6422cd38b74238a2d55510d572946e0a6b0ef1a2ab5b9321ae909eca8b6ea618577170ea13966413000a7e023eca45c9cc9d95000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r4, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r4, 0x6, 0x401, 0x7f}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000000c0)={0x8, 0x100, 0x2}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d4e15719c9fd4f1fb0d6c2995fcf259ddd22e891da813b34a83b7f1923dea7c618ca6780b733fe79f165650289b0da5c40fc4ef18f34a8643cced64a8ea7adfce0a37958f4a4046c471ab7b9a63d1eb822d9bdc7285665dc50c33f09798348d61d8954515565f7da0aea67a3974b68124e0eff1e11cce0d4a4edbec2408d52dc9df9c9cfe10ed13fe8268bf87a848c5d08732b192279ab5bf87a9d4e7c4df45c3", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) [ 874.640106] protocol 88fb is buggy, dev hsr_slave_0 [ 874.645558] protocol 88fb is buggy, dev hsr_slave_1 [ 874.650817] protocol 88fb is buggy, dev hsr_slave_0 [ 874.655924] protocol 88fb is buggy, dev hsr_slave_1 14:14:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_keyring_id(0x0, 0x0, 0x1) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff030000000000", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3}}, 0x0) 14:14:47 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196a4", 0x62, 0x0) keyctl$get_keyring_id(0x0, r5, 0x1) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff030000000000", @ANYRES32=r7, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600"], 0x3}}, 0x0) 14:14:47 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) [ 874.950765] protocol 88fb is buggy, dev hsr_slave_0 [ 874.956511] protocol 88fb is buggy, dev hsr_slave_1 [ 874.962823] protocol 88fb is buggy, dev hsr_slave_0 [ 874.968360] protocol 88fb is buggy, dev hsr_slave_1 14:14:47 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_keyring_id(0x0, 0x0, 0x1) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff030000000000", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3}}, 0x0) 14:14:48 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:48 executing program 0: r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0xe, 0x0, &(0x7f0000000000)) 14:14:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000880)=0xfffffcf8) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_DBG_G_CHIP_INFO(r5, 0xc0c85666, &(0x7f00000009c0)={{0x0, @name="a4266ec820e3a0001a6ff22964eec93022cc1ae1b0e7bac995c3fe78c26ad1b4"}, "29a953ac9a4eb17917d11fda50e6ec14a355f503735dc7fa13cd165c0d2e6778", 0x1}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r7, 0xa) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r7, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r10], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="9e3a41c9a372b264bd363b049f3acc2355bfe3d121ac7ce2d9ad06063f67349cb627f34b98a67b918ac01c86675fa9839b9480e8b9e2", 0x36, 0x10000}], 0x200002, &(0x7f0000000540)={[{@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}, {@rodir='rodir'}, {@shortname_win95='shortname=win95'}, {@utf8no='utf8=0'}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@smackfshat={'smackfshat', 0x3d, '!eth1'}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'}}, {@euid_lt={'euid<', r9}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vbi#\x00'}}, {@smackfsdef={'smackfsdef'}}, {@euid_lt={'euid<', r11}}, {@obj_user={'obj_user'}}, {@obj_user={'obj_user', 0x3d, '-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'}}]}) r12 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r12, 0x1000000) sendfile(r0, r12, 0x0, 0xeefffdef) r13 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r14 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r15 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x280200, 0x0) write$cgroup_subtree(r15, &(0x7f0000000300)={[{0x2d, 'rdma'}, {0x2d, 'cpu'}]}, 0xb) ftruncate(r14, 0x1000000) sendfile(r13, r14, 0x0, 0xeefffdef) [ 875.336356] sock: process `syz-executor.0' is using obsolete getsockopt SO_BSDCOMPAT 14:14:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xfefa) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 14:14:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:48 executing program 0: 14:14:48 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:48 executing program 4: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000040)={0x5d22, 0x4000, 0x6, 0x78, 0xe, "c646c8075b287122"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = shmget(0x2, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="3400000003000091ec19000000000000000000000000000000000013000000000000006b657972696e672c73476c667472757374"], 0x34) 14:14:48 executing program 0: 14:14:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:48 executing program 5: socket(0x10, 0x803, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x77359400}, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 14:14:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000280)={0x20001, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}) 14:14:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x100842, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0xcc3e, 0x80000000}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726d75704b696497", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)={0xc5, 0x29, 0x2, {0x7fff, [{{0x48, 0x1, 0x7}, 0xba8, 0xb4, 0x7, './file0'}, {{0x73, 0x2}, 0x5, 0x5, 0x7, './file0'}, {{0x0, 0x1}, 0x10001, 0x6d, 0x7, './file0'}, {{0x60, 0x4, 0x5}, 0x7, 0x3, 0x7, './file0'}, {{0x20, 0x1, 0x4}, 0xa8, 0x6, 0x7, './file0'}, {{0x10, 0x0, 0x8}, 0x0, 0x29, 0x7, './file0'}]}}, 0xc5) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discard=0x00000000ffffffff,discard=0x0000000000000000,umask=0x0']) 14:14:48 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) getpid() 14:14:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX=r0, @ANYRESOCT], @ANYRESHEX, @ANYBLOB=',group_id=', @ANYRESHEX=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="34000000030000000000000073a49b43fa0000000000000013000000000000006b657972696e672c73656cbca220541331ff9c5ea69ce871b6a4adf7afb9ea6186c04c981f950d471ab307b855992a4e18831f727c532c66e1202b74b805dbfec2fbd959cc07529e753e43f928a25538b8e5e1"], 0x34) 14:14:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) r5 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196", 0x61, 0x0) keyctl$get_keyring_id(0x0, r5, 0x1) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r8, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600"], 0x3}}, 0x0) 14:14:49 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:14:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x4080, 0xa9967d5d2d26b7a6) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000080)=0x6e) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r4}}, 0x120) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) clock_gettime(0x0, &(0x7f0000002b00)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000002a80)=[{{&(0x7f0000000440)=@sco, 0x80, &(0x7f0000002680)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/77, 0x4d}, {&(0x7f0000002540)}, {&(0x7f0000002580)=""/216, 0xd8}], 0x5, &(0x7f0000002700)=""/127, 0x7f}, 0x3}, {{0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f0000002780)=""/17, 0x11}, {&(0x7f00000027c0)=""/123, 0x7b}, {&(0x7f0000002840)=""/103, 0x67}, {&(0x7f00000028c0)=""/24, 0x18}, {&(0x7f0000002900)=""/253, 0xfd}], 0x5}, 0x401}], 0x2, 0x2000, &(0x7f0000002b40)={r6, r7+30000000}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x2e, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x2b}, 0x2310}, r4}}, 0x38) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x402800a, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d873661c2c6d9a9fad32ae0f16e8678152e4180adf8b30de584348d41a056e89e16caa04f3c644d4f4d361bfbec7acda284baea968fa9", @ANYRESDEC, @ANYBLOB="a52c8df7c15332b7e4eff2245bfda08403338cfe21ef18767cc763964d8f71306b3f534643f8ad6f4713a19851e92e3f9bc0cfe1ea9f8c4950e6ba", @ANYBLOB]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="f2fcffff0300000000000000000000000000e2ff0000000006000000000000006b657972696e672c73656c6674727573ad25666cab56c000000011c7546797c73b514ef6ae6e983cc62a40fa0f578c8ec124f9d396c0d73bf8784bb85ad3cb"], 0x17e) getrandom(&(0x7f00000000c0)=""/64, 0x40, 0x2) 14:14:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:49 executing program 5: socket(0x10, 0x803, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x77359400}, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 14:14:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:14:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) r5 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196", 0x61, 0x0) keyctl$get_keyring_id(0x0, r5, 0x1) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r8, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600"], 0x3}}, 0x0) 14:14:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESDEC, @ANYRESHEX=r3, @ANYRES16=r7, @ANYRESOCT, @ANYPTR64=&(0x7f0000000100)=ANY=[], @ANYRES16, @ANYRESOCT, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR, @ANYPTR64, @ANYBLOB="60d44bb89f8fbceb0608c4306a7d3f014ad27f833721916c0311914e3f2a1b256bedd506ffa520798591c8784678f5864ba3e673188dd756d96b0e1302e6a980b1b0596b9a5437a683a5f2cad932cdda08413f49e8a7268b8e3a312b3ecc8895", @ANYRESHEX=r4, @ANYPTR64, @ANYRES16=r5, @ANYRESDEC=r6, @ANYRES32=0x0], @ANYRESHEX=r0, @ANYRES16], @ANYRES64=r4, @ANYRES64=r3, @ANYRESOCT=r5]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:14:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) clone(0xb7757dc21c93a4cc, &(0x7f0000000000)="a734c26512c8ea16fd2697e253b48246aa7c0ac81557c4523a635f62fce37632423b7c502030ed16000178e15bf1d298bdd02c6e30cc0e1db5eeb854b4d1c177d68dd39bf0857430ea763d871919a1a32f446f8e3caab993943ae89b42496d6c7194bee13cc20fa585957cec1b6b3e0409654abb2e02af94e6105891245d90ae075f4560ca8a3087dcdef8d2c36ea871ac11f2251d2a", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)="4cfebfd6c9d548044dfa870f1df2a8289d202b8833de728a978e8e4375dfe81b826ec868b05afc38403c66699a8756ef064194136bf10937fba6d24b8f65626bd0d733d3b5f3e804b176a65fb191626faa62ffb08902aed42346f287d6f97aaa78b448e7be2acff9c2c34de1de87b7b462122092eb2436f06eb9ec5312ed70bf07fde2ec82297ef7147aec389c1b7d9eb50345df288babb59475223350a57d7db9c6d827c55cc810860271e624b9d9e04c8b24870c65e09fa9ce2529dbb2677aec56ae77b4cffa226fefdec72a11e25e62a66cfd61bbcbf9ee") sendfile(r0, r1, 0x0, 0xeefffdef) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = accept(r2, 0x0, &(0x7f0000000100)) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) accept$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r3, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x30a1100}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@newtfilter={0x2c, 0x2c, 0x4, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0xa, 0xd}, {0xffe0, 0xffff}, {0x5, 0xe}}, [@TCA_RATE={0x8, 0x5, {0x9, 0x20}}]}, 0x2c}, 0x1, 0x0, 0x0, 0xb157bd97effd77d2}, 0x4000) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) 14:14:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "18b0b250d8d5a244e04672354254526f98148d45"}, 0x15, 0x2) 14:14:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[]) 14:14:50 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) r5 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196", 0x61, 0x0) keyctl$get_keyring_id(0x0, r5, 0x1) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r8, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600"], 0x3}}, 0x0) 14:14:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[]) 14:14:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[]) 14:14:50 executing program 5: socket(0x10, 0x803, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x77359400}, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 14:14:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]) 14:14:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) r5 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196", 0x61, 0x0) keyctl$get_keyring_id(0x0, r5, 0x1) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r8, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600"], 0x3}}, 0x0) 14:14:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) syz_init_net_socket$ax25(0x3, 0x5, 0xc4) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x10504) accept4$nfc_llcp(r4, 0x0, &(0x7f0000000040), 0x800) 14:14:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]) 14:14:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e20, 0x80, @dev={0xfe, 0x80, [], 0xa}, 0x49}, @in6={0xa, 0x4e24, 0x4, @remote, 0x25e881d9}], 0x68) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000100)=""/41, 0x29, 0x2, &(0x7f0000000180)=@file={0x1, './file0/../file0\x00'}, 0x6e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:50 executing program 3: socket$inet(0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]) 14:14:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:ppp_device_t:s0\x00', 0x22, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3400000000000001000100000020000000000013000000000000006b657972776e672c73656c667472757374656400"], 0x34) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, 0x0, 0x4, 0x40, &(0x7f0000ffe000/0x2000)=nil, 0xffffff80}) 14:14:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,discar']) 14:14:51 executing program 0: 14:14:51 executing program 0: [ 878.352241] jfs: Unrecognized mount option "discar" or missing value 14:14:51 executing program 5: socket(0x10, 0x803, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x77359400}, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 14:14:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0x0, 0x4000}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:51 executing program 0: 14:14:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]) 14:14:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = gettid() tkill(r3, 0x3c) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000080)=0x0) kcmp(r3, r5, 0x1, r0, 0xffffffffffffffff) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$selinux_attr(r6, &(0x7f0000000040)='system_u:object_r:auditd_exec_t:s0\x00', 0x23) r7 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r2, r7, 0x0, 0xeefffdef) 14:14:51 executing program 3: socket$inet(0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 879.110157] net_ratelimit: 16 callbacks suppressed [ 879.110162] protocol 88fb is buggy, dev hsr_slave_0 [ 879.120278] protocol 88fb is buggy, dev hsr_slave_1 [ 879.125487] protocol 88fb is buggy, dev hsr_slave_0 [ 879.130673] protocol 88fb is buggy, dev hsr_slave_1 14:14:51 executing program 0: 14:14:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000000)={0xfffffffe, @remote}) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 14:14:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]) 14:14:52 executing program 0: 14:14:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000280)=""/152) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='\x89(\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6665d0b20e69", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYPTR], @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000180)=0x9, 0x4, 0x0) 14:14:53 executing program 5: 14:14:53 executing program 0: 14:14:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB]) 14:14:53 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:53 executing program 3: socket$inet(0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/adsp1\x00', 0x200, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r3, 0x8d7ef73e1eaf5a70, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x81d}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3d}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x4b}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xb1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x32}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200000}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x97}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x98}, 0x1, 0x0, 0x0, 0x40805}, 0x40884) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) [ 880.310169] protocol 88fb is buggy, dev hsr_slave_0 [ 880.315319] protocol 88fb is buggy, dev hsr_slave_1 14:14:53 executing program 0: 14:14:53 executing program 5: 14:14:53 executing program 0: 14:14:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quot']) 14:14:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getdents(r0, &(0x7f0000000040)=""/252, 0xfc) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x408000, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', r1, &(0x7f0000000380)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x20000, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000480)={0x0, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r5, 0x2000}, 0x8) 14:14:53 executing program 0: 14:14:53 executing program 5: 14:14:53 executing program 0: 14:14:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000040)={0x6, 0x9, 0x200}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:53 executing program 5: [ 880.559272] jfs: Unrecognized mount option "quot" or missing value [ 880.870111] protocol 88fb is buggy, dev hsr_slave_0 [ 880.875477] protocol 88fb is buggy, dev hsr_slave_1 [ 880.880766] protocol 88fb is buggy, dev hsr_slave_0 [ 880.885953] protocol 88fb is buggy, dev hsr_slave_1 14:14:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quot']) 14:14:53 executing program 5: 14:14:53 executing program 0: 14:14:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r1, 0xa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4], 0x2cf}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0000) statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x400, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff0001, 0x1, &(0x7f0000000080)=[{&(0x7f0000000480)="65ae91f4d3fca0712f8a65fb7522c3935f23cc7df500bf06d27c624c024fa8d3c3f26c96d6e17f7e8167eca17fee25ae05096f4223e6a4d0b5a23533e62d4f36354834f680b7169fe53a72dbe76cb519364a67a36ce302a0ae53db53becbcd456f5b821a61c9cb959860a2de8d8c246e2aac13d5c1468d0f63513433f8aeeb2dd82807fca5ee1b31cb841162481830964e137f09d16fe413da21be054ba8d300c9526b0ceb7a2cdaac122946aa7946ef06e2f3447166bc31181b11bafd82da1563dc4d1c645a78b2175579436ea553e8ff71018ceb82b856c8d5aacd8af95213df9269ea9b5c76b341a634327ee631244d05b2bc6d35e0409a3b57f311285b", 0xff, 0x8}], 0x4, &(0x7f0000000680)={[{@iocharset={'iocharset', 0x3d, 'macinuit'}}, {@umask={'umask', 0x3d, 0x7b1}}, {@resize='resize'}, {@discard='discard'}, {@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r3}}, {@usrquota='usrquota'}, {@resize_size={'resize', 0x3d, 0xff}}, {@resize='resize'}, {@usrquota='usrquota'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r5}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2067846f75705f6a6400", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="34000000030000000000000000000000000000100000000600000000000000006b657972696e672c73556c6674727573746564004d299800037eaeabc61f2bd908cc0d61afce11f3d17364608a0c9640495a2c0c36ec1b65d99d3f4b28eaadcb305671704672bc00c629c132a5c889a47bec8cff3f649a41e444a10bde54a089da9de13267af5d5f56f1199479418348467e5c4385a6b63b289f86dd5e6bcc3b20a97956c1cc36ae33a9f0239d9c56284bf56db587a11095e3df44fdef3c3ab7746588cf7f8099aa124aa36c902044eda089cc4064951591c14ee33d321f657073a4d771eb113385285e02a8116d963e5fc727d858d9cbafd89809cdbbc6f3c2fa64bc3a212ade992ac95035666d0a3e3247a8fdcf25a94d30bfb693f9a97bbfee47fe1ec5086c6fc91da7bf1536b10926343765175535225ff0dbb888d1e601b64dfabbcc8e7d93ab5e16aebe03fd600e1963371122f3ac2f44c9277b22b6e3318879698c491dda3572af64cb9d7772001f7b5590c9885fb0df9fd049acebdc5c044b023b0ce20d807c75ea76d97126c2652788dcc1469afaf03b4edeed349b7521d6e54a826c45d865bdc6024f5a94a9a52affccf0279a79b8224bb0e52bd90d63c7d27cb6982ce3d30cdb0f5cb535b1198b56ac43ed6e3567c211363707410c26718818087df19d16816e34a9c8dc10ee9a536a056626a347376eb7fe"], 0x34) 14:14:53 executing program 3: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f00000000c0)={{0x4, @name="5c65e6de45a32a2cf0d85a30471a805f2d999d423181c8e1df02ce0f906071c9"}, 0x8, 0x8, 0xa9a}) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='/d\xe1\xf9\x02\x16\x06\x16P\x1b', 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000100)=0x47) accept4$bt_l2cap(r4, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:54 executing program 5: 14:14:54 executing program 0: [ 881.256255] jfs: Unrecognized mount option "quot" or missing value 14:14:54 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x6) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x4) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) read$midi(r1, &(0x7f0000000280)=""/129, 0x81) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 14:14:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quot']) 14:14:54 executing program 0: 14:14:54 executing program 5: [ 881.399762] Unknown ioctl 20998 [ 881.411928] Unknown ioctl 21525 [ 881.433350] Unknown ioctl 20998 14:14:54 executing program 0: 14:14:54 executing program 5: [ 881.444795] jfs: Unrecognized mount option "quot" or missing value [ 881.458246] Unknown ioctl 21525 14:14:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, @ethernet={0x6, @dev={[], 0x21}}, @nfc={0x27, 0x0, 0x1, 0x7}, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, 0x4, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)='veth0\x00', 0x4e1, 0x0, 0x2fb}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:54 executing program 5: 14:14:54 executing program 3: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:54 executing program 0: 14:14:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=is']) 14:14:54 executing program 5: 14:14:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) migrate_pages(r2, 0x100, &(0x7f0000000280)=0x3e0000000000000, &(0x7f00000002c0)=0x5) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRES16=r1, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="dd455d40299baf9772556bb926550834b5689afc14f55113aac6768b423511278f3b56d30909e84ee984778503d0405b862a122a7ab79ccc000040bbd5fd8c1f51a89e3fe69df4466c5e3843f42c0684e2636ceb4c6a1e2d3709c6d3dbaccb11d36370c576abd2771f6c2df864c75f28c47d0498", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000000)=0x4) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000040)) r5 = memfd_create(&(0x7f0000000080)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x15<(\xeaN\xbcSoz\xe5.c\xdf\x8b\xd2m}\xc7D\x98\xd4p.e\x050,c9:\x95z\xe2\xa9\xcf\xd2\x90*\xaa\xc0W.\xcb|.F_\xf8(\xa4\x91\xc8\v\x9b>3\x15(\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00\xe6\x8a\xf19\x8b+\xfdx\xf8C\x80\x94\xa3\x10>_\x95J>I\xf8\xbc\x8b\x8b\x8c\xa5\xc7\xc45VN\xce!\xc1S\xe8:@\xe9\xbbw\x01y\x10\xd9%\x94sbP\xc6)\x86a\x10\xdaA\xc1g.]\xc1\x84\xc4<\x87>\xc3lms\x9f\xd4g\rb\xd5\xc5\xbf\xed\xc0\x1dR)', 0xbb64ed30a464f147) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) 14:14:54 executing program 5: 14:14:54 executing program 0: 14:14:54 executing program 4: [ 882.206412] JFS: charset not found 14:14:54 executing program 5: 14:14:55 executing program 4: 14:14:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=is']) [ 882.372820] JFS: charset not found 14:14:55 executing program 3: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:55 executing program 0: 14:14:55 executing program 4: 14:14:55 executing program 5: 14:14:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=is']) 14:14:55 executing program 5: 14:14:55 executing program 0: 14:14:55 executing program 4: 14:14:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x84801, 0x0) ioctl$VHOST_RESET_OWNER(r4, 0xaf02, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae720b872d4b7828e3b48522c673aa6cb366d4201e2aee3261eb52da262b1f", 0xf4, r3) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="4d3c52f39cc1720b248538dde65c199d10edc2014fb25e2db36dc663dda52d78209f458673046bd6ddf3026179aefdce4a4f17747cabc498e0932d2fd3fe9f82d75962d037162cf9eefe58d0184cba2d4b06fd07b322c140c2fe2b37ddf65e13c928d213aea0422bfdddfc235098480710ed979bb230732947dbe0e49450e4fc8e8a57fb9a872c7e7f39df11690683d3dd496d91e2091414b76901df6229d72f6c8fdfdf96d0fda8d0286f3e8470f03579a9d0d0c60e9683ee3ba99106d10867a44de431f7ef6d89e8c9a6e71b760bffeab25cc7d299064ff1bbb6a39ce0c2d27c5d35085474a8f45b5b9023e18029ef9eb823a981d7f9d62f31b74925ba", 0xfe, r3) keyctl$get_security(0x11, r5, &(0x7f0000000200)=""/143, 0x8f) r6 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r6, 0x1000000) fchmod(r1, 0x40) sendfile(r2, r6, 0x0, 0xeefffdef) r7 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xab8, 0x200) ioctl$TCSBRK(r7, 0x5409, 0x1) 14:14:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x40086607, &(0x7f0000000000)={0x7ff02, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_bp={0x0}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x8a0a, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x10, 0x8, 0x8a8f}, &(0x7f00000004c0)=0x80000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x80000000}}, 0x10) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0xa, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) 14:14:55 executing program 5: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg(r0, &(0x7f000000aa80)={&(0x7f0000008600)=@hci, 0x80, &(0x7f000000a9c0)=[{0x0}, {0x0}, {&(0x7f0000009700)=""/19, 0x13}, {&(0x7f0000009740)=""/146, 0x92}, {&(0x7f0000009800)=""/172, 0xac}, {0x0}, {0x0}, {0x0}, {&(0x7f000000a980)=""/17, 0x11}], 0x9}, 0x10000) r1 = socket$kcm(0x2, 0x1, 0x84) close(r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000adc0)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa45}, [@generic={0x3, 0x1, 0x0, 0x3, 0x7fffffff}, @alu={0x7, 0x1, 0x0, 0x3, 0x6, 0x0, 0xfffffffffffffffc}]}, 0x0, 0x0, 0x26, &(0x7f0000000300)=""/38, 0x41000, 0xf, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000000ab40)={0x0, 0xd, 0x7, 0x3}, 0x10, 0x0, r3}, 0x78) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1c0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffe}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r4, 0x703, 0xe, 0x4d2f, &(0x7f0000000080)="1c04ff01de6da9725f90c5a06d0f9f2400844d0044a98db225a47ecb10b429441dec77009050d9560e58f2e162226d4fe467a890b6c4c556c6894acf3d4cd49c4dd5a2d05d6ce642e3abc0e0cb0a7de568fb3f30013c74eb73383ebaf4257042ec5277fa18a9b201882996c7b8de5080c75756094ac8e258ff1673c27fb2f2bffc290edbc5dec9e44b6fab8d5fcbd12ae8339b04701b316bd5eccc3961ce80", 0x0, 0xf0, 0x0, 0x0, 0xfffffffffffffe19}, 0x28) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000aac0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) socket$kcm(0x2, 0x1, 0x84) r9 = socket$kcm(0xa, 0x6, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r9, 0x10d, 0xb, &(0x7f0000000000)=r10, 0xb) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) write$cgroup_subtree(r6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xfdef) [ 883.101238] JFS: charset not found 14:14:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@sco={0x1f, {0x3, 0x7, 0x0, 0x0, 0x0, 0xc4}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)="2fe819c83a10996786f7b11e07406fce2b16a7421c888ecc8b583c809df392da4cdc513c7eced38559b886dbe79e3ac3b03bad553076b08bc08531f035f939", 0x3f}, {0x0}], 0x2}, 0x10000440) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.evenvs\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4f, 0x0, &(0x7f0000001bc0)="676dd686eb0660021f3a96c87a36fe6ebb5b8fd4b5a66e6948d209ff52b57e97f9716f801b9252a394b2c95bc04c6d203d3fdefd58411ed7f5b654730594445cc1f64e12ead93318a1b607cc4a9458"}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="00dff0626c73aa997e7dc2c047b729908f6d656d6f7279202ec3586fc2d3506050c0555f70cc50e9ebd02fd2b57f64f08d32e330a28cde4dcbe3d42f2f782eb657de8eba1bf5db26620400000000000000f6c67bd546a9526f95509551b1a68b"], 0xfdef) [ 883.204331] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 14:14:56 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3']) 14:14:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@sco={0x1f, {0x3, 0x7, 0x0, 0x0, 0x0, 0xc4}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)="2fe819c83a10996786f7b11e07406fce2b16a7421c888ecc8b583c809df392da4cdc513c7eced38559b886dbe79e3ac3b03bad553076b08bc08531f035f939", 0x3f}, {0x0}], 0x2}, 0x10000440) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.evenvs\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4f, 0x0, &(0x7f0000001bc0)="676dd686eb0660021f3a96c87a36fe6ebb5b8fd4b5a66e6948d209ff52b57e97f9716f801b9252a394b2c95bc04c6d203d3fdefd58411ed7f5b654730594445cc1f64e12ead93318a1b607cc4a9458"}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="00dff0626c73aa997e7dc2c047b729908f6d656d6f7279202ec3586fc2d3506050c0555f70cc50e9ebd02fd2b57f64f08d32e330a28cde4dcbe3d42f2f782eb657de8eba1bf5db26620400000000000000f6c67bd546a9526f95509551b1a68b"], 0xfdef) 14:14:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x40086607, &(0x7f0000000000)={0x7ff02, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_bp={0x0}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x8a0a, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x10, 0x8, 0x8a8f}, &(0x7f00000004c0)=0x80000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x80000000}}, 0x10) write$cgroup_pid(r0, &(0x7f0000000480), 0xf) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0xa, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) 14:14:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev//..\x00\x03\x00', 0x65aa01, 0x0) 14:14:56 executing program 1: r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/680], 0x2a8) ftruncate(r3, 0x8001) sendfile(r1, r2, 0x0, 0xeefffdef) 14:14:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x10000000009, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0xa07) read(r1, &(0x7f0000000040)=""/11, 0xfffffcfb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000240)) r4 = syz_open_pts(r1, 0x0) dup3(r3, r2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r5, &(0x7f0000000300)) ioctl$TCXONC(r4, 0x540a, 0x0) [ 883.936078] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 14:14:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3']) 14:14:56 executing program 4: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:56 executing program 0: socket$inet(0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3']) [ 884.470166] net_ratelimit: 14 callbacks suppressed [ 884.470172] protocol 88fb is buggy, dev hsr_slave_0 [ 884.480298] protocol 88fb is buggy, dev hsr_slave_1 14:14:57 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:57 executing program 5: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,dis']) [ 884.773139] jfs: Unrecognized mount option "dis" or missing value 14:14:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,']) 14:14:57 executing program 5: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,']) 14:14:57 executing program 5: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00=%\x00\xf5]\"|\xca\"\xfe\x00\xb7\x82\x19\x01]8\xd0j\x97\xef\\T\xba\xa9o\xb7\xf7\xf3\x83\\-e\x03\r\xb5\xc6,\x9fkz(\'\x87\x1e#\xd0\f\xb4\xb5G\xfd\t\xcb2\xd6\xb7t\xac\x04\xb2,\xb9FU\x18\xe8\x19\xe4|\xda\xa0\x05\x9b_1~0\xe9P\x90\x93A\x87*\xe1\x02\xa6_\xa6\xe0(e\xd7e\xc23\xb9u\xb17j\xf6\xbe\xc6\xaa\xa1\\\xf0z\xa8z\x1a\xe4S\xf7\x13\xdf\x96n;jm\xee\x02 \xd0\x94\xfc@.\xec\x8ch\x90\xf3\xcf\xd4\xe1\x8d!\x94>\"aU\xf8y\xaa\xaa,\"\x9e\xe5\xe9\xc7I\xcav\xa3\xad\x02\x80\xd2V\x0eG/i\xdf\xdf\xd4:', 0x2) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x5, 0x4) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:57 executing program 4: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 885.030133] protocol 88fb is buggy, dev hsr_slave_0 [ 885.035294] protocol 88fb is buggy, dev hsr_slave_1 [ 885.040459] protocol 88fb is buggy, dev hsr_slave_0 [ 885.045557] protocol 88fb is buggy, dev hsr_slave_1 14:14:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,']) 14:14:57 executing program 0: socket$inet(0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,di']) [ 885.236124] jfs: Unrecognized mount option "di" or missing value [ 885.350133] protocol 88fb is buggy, dev hsr_slave_0 [ 885.355302] protocol 88fb is buggy, dev hsr_slave_1 [ 885.360476] protocol 88fb is buggy, dev hsr_slave_0 [ 885.365562] protocol 88fb is buggy, dev hsr_slave_1 14:14:58 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:58 executing program 0: socket$inet(0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 885.617001] jfs: Unrecognized mount option "d" or missing value 14:14:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,']) 14:14:58 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\x00\x00\x00\x00\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr\xbc\x9e\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f00000000c0)={0x7fff, 0x3}) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40, 0x200) r5 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f0000000080)={0x6, 'veth1_to_hsr\x00', {0xfffffff9}, 0x2}) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000040)) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) 14:14:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = dup2(r1, r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x879e5cd08084d292}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x48, r5, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0xc0006}, 0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f0000000300)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4161ae", @ANYRESHEX=r0, @ANYBLOB='(rootmode=00000000000000000040000,user_id=', @ANYRESOCT=r6, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, 'keyring,selftrusted'}}, 0x34) 14:14:58 executing program 5: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x0, @empty, 0x7ff}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x7, @empty, 0x200}, @in6={0xa, 0x4e23, 0x10000, @mcast1, 0x100}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x5}, @in6={0xa, 0x4e24, 0xe5b, @mcast2, 0x3}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0x1, @local, 0x3}], 0xc8) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000000)=""/62) sendfile(r2, r3, 0x0, 0xeefffdef) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140)={0x20, 0x8001, 0x81, 0x6ee0}, 0x10) 14:14:58 executing program 4: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,']) 14:14:58 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:58 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:59 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,']) 14:14:59 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:59 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r8, 0xc0a85320, &(0x7f0000000680)={{0xed, 0x20}, 'port1\x00', 0x40, 0x4, 0xfff, 0x5f3, 0x5, 0x4, 0x6, 0x0, 0x7, 0x1}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000040)=0x6, 0x4) 14:14:59 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:59 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:14:59 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 886.729117] FAULT_INJECTION: forcing a failure. [ 886.729117] name failslab, interval 1, probability 0, space 0, times 0 [ 886.764567] CPU: 1 PID: 9788 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 886.772505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.781952] Call Trace: [ 886.784620] dump_stack+0x142/0x197 [ 886.788236] should_fail.cold+0x10f/0x159 [ 886.792374] should_failslab+0xdb/0x130 [ 886.796343] __kmalloc+0x2f0/0x7a0 [ 886.799882] ? __sb_end_write+0xc1/0x100 [ 886.803940] ? strnlen_user+0x12f/0x1a0 [ 886.807901] ? SyS_memfd_create+0xba/0x3a0 [ 886.812132] SyS_memfd_create+0xba/0x3a0 [ 886.816234] ? shmem_fcntl+0x130/0x130 [ 886.820121] ? do_syscall_64+0x53/0x640 [ 886.824085] ? shmem_fcntl+0x130/0x130 [ 886.827971] do_syscall_64+0x1e8/0x640 [ 886.831901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 886.836742] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 886.842024] RIP: 0033:0x45a919 [ 886.845197] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 886.852937] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a919 [ 886.860193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 886.867506] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 14:14:59 executing program 4: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:14:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r8, 0xc0a85320, &(0x7f0000000680)={{0xed, 0x20}, 'port1\x00', 0x40, 0x4, 0xfff, 0x5f3, 0x5, 0x4, 0x6, 0x0, 0x7, 0x1}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000040)=0x6, 0x4) 14:14:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f0000002600)=ANY=[@ANYBLOB="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"], 0x2a8) recvmmsg(r2, &(0x7f00000020c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/46, 0x2e}, {&(0x7f0000000200)=""/242, 0xf2}], 0x2, &(0x7f0000000440)=""/124, 0x7c}, 0x40}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/131, 0x83}], 0x2}, 0x1000}, {{&(0x7f0000001580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001600)=""/185, 0xb9}], 0x1, &(0x7f0000001700)=""/115, 0x73}, 0xf4}, {{&(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001800)=""/141, 0x8d}], 0x1}, 0x79c}, {{&(0x7f0000001900)=@pptp, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001980)=""/124, 0x7c}], 0x1, &(0x7f0000001a40)=""/228, 0xe4}, 0x251}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001b40)=""/254, 0xfe}, {&(0x7f0000001c40)}, {&(0x7f0000001c80)=""/85, 0x55}, {&(0x7f0000001d00)=""/157, 0x9d}, {&(0x7f0000001dc0)=""/131, 0x83}], 0x5, &(0x7f0000001f00)=""/47, 0x2f}, 0x4}, {{&(0x7f0000001f40)=@tipc, 0x80, &(0x7f0000002040)=[{&(0x7f0000001fc0)=""/83, 0x53}], 0x1, &(0x7f0000002080)=""/46, 0x2e}, 0x2}], 0x7, 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000002280)=ANY=[@ANYBLOB="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"]) sendfile(r0, r1, 0x0, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) 14:14:59 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 886.874771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 886.882123] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 886.969400] FAULT_INJECTION: forcing a failure. [ 886.969400] name failslab, interval 1, probability 0, space 0, times 0 [ 886.984958] CPU: 1 PID: 9802 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 886.992782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.002278] Call Trace: [ 887.004873] dump_stack+0x142/0x197 [ 887.008500] should_fail.cold+0x10f/0x159 [ 887.012654] should_failslab+0xdb/0x130 [ 887.016627] kmem_cache_alloc+0x2d7/0x780 [ 887.020767] ? __alloc_fd+0x1d4/0x4a0 [ 887.024557] __d_alloc+0x2d/0x9f0 [ 887.027994] ? lock_downgrade+0x740/0x740 [ 887.032128] d_alloc_pseudo+0x1e/0x30 [ 887.035926] __shmem_file_setup.part.0+0xd8/0x400 [ 887.040762] ? __alloc_fd+0x1d4/0x4a0 [ 887.044550] ? shmem_fill_super+0x8c0/0x8c0 [ 887.048864] SyS_memfd_create+0x1f9/0x3a0 [ 887.053016] ? shmem_fcntl+0x130/0x130 [ 887.056902] ? do_syscall_64+0x53/0x640 [ 887.060874] ? shmem_fcntl+0x130/0x130 [ 887.064759] do_syscall_64+0x1e8/0x640 [ 887.068633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.073463] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.078637] RIP: 0033:0x45a919 [ 887.081810] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 887.089628] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a919 [ 887.097002] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 887.104285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 887.111549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 887.118913] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 14:14:59 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:14:59 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:14:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r8, 0xc0a85320, &(0x7f0000000680)={{0xed, 0x20}, 'port1\x00', 0x40, 0x4, 0xfff, 0x5f3, 0x5, 0x4, 0x6, 0x0, 0x7, 0x1}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000040)=0x6, 0x4) [ 887.243790] FAULT_INJECTION: forcing a failure. [ 887.243790] name failslab, interval 1, probability 0, space 0, times 0 [ 887.259615] CPU: 0 PID: 9815 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 887.267619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.267626] Call Trace: [ 887.279609] dump_stack+0x142/0x197 [ 887.283267] should_fail.cold+0x10f/0x159 [ 887.287433] should_failslab+0xdb/0x130 [ 887.291428] kmem_cache_alloc+0x2d7/0x780 [ 887.291442] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 887.291460] ? rcu_read_lock_sched_held+0x110/0x130 [ 887.291470] ? shmem_destroy_callback+0xa0/0xa0 [ 887.291478] shmem_alloc_inode+0x1c/0x50 [ 887.291489] alloc_inode+0x64/0x180 [ 887.291501] new_inode_pseudo+0x19/0xf0 [ 887.301103] new_inode+0x1f/0x40 [ 887.301115] shmem_get_inode+0x75/0x750 [ 887.301130] __shmem_file_setup.part.0+0x111/0x400 [ 887.301140] ? __alloc_fd+0x1d4/0x4a0 [ 887.301148] ? shmem_fill_super+0x8c0/0x8c0 [ 887.301164] SyS_memfd_create+0x1f9/0x3a0 [ 887.301178] ? shmem_fcntl+0x130/0x130 [ 887.310891] ? do_syscall_64+0x53/0x640 [ 887.310905] ? shmem_fcntl+0x130/0x130 [ 887.310917] do_syscall_64+0x1e8/0x640 [ 887.310927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.310943] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.310951] RIP: 0033:0x45a919 [ 887.310955] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 887.384016] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a919 14:15:00 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 887.391275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 887.398587] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 887.405852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 887.413126] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 887.455104] FAULT_INJECTION: forcing a failure. [ 887.455104] name failslab, interval 1, probability 0, space 0, times 0 [ 887.466824] CPU: 1 PID: 9823 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 887.474650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.484000] Call Trace: [ 887.486593] dump_stack+0x142/0x197 [ 887.490234] should_fail.cold+0x10f/0x159 [ 887.494395] should_failslab+0xdb/0x130 [ 887.498385] kmem_cache_alloc+0x2d7/0x780 [ 887.502528] ? shmem_alloc_inode+0x1c/0x50 [ 887.506761] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 887.512206] selinux_inode_alloc_security+0xb6/0x2a0 [ 887.517312] security_inode_alloc+0x94/0xd0 [ 887.521631] inode_init_always+0x552/0xaf0 [ 887.525864] alloc_inode+0x81/0x180 [ 887.529478] new_inode_pseudo+0x19/0xf0 [ 887.533454] new_inode+0x1f/0x40 [ 887.536812] shmem_get_inode+0x75/0x750 [ 887.540795] __shmem_file_setup.part.0+0x111/0x400 [ 887.545734] ? __alloc_fd+0x1d4/0x4a0 [ 887.549541] ? shmem_fill_super+0x8c0/0x8c0 [ 887.553859] SyS_memfd_create+0x1f9/0x3a0 [ 887.558105] ? shmem_fcntl+0x130/0x130 [ 887.562128] ? do_syscall_64+0x53/0x640 [ 887.566103] ? shmem_fcntl+0x130/0x130 [ 887.569981] do_syscall_64+0x1e8/0x640 [ 887.573862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.578697] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.583883] RIP: 0033:0x45a919 [ 887.587060] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 887.594980] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a919 14:15:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r8, 0xc0a85320, &(0x7f0000000680)={{0xed, 0x20}, 'port1\x00', 0x40, 0x4, 0xfff, 0x5f3, 0x5, 0x4, 0x6, 0x0, 0x7, 0x1}) 14:15:00 executing program 0 (fault-call:6 fault-nth:0): r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:00 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 887.602249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 887.609753] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 887.617036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 887.624385] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 887.718488] FAULT_INJECTION: forcing a failure. [ 887.718488] name failslab, interval 1, probability 0, space 0, times 0 [ 887.738325] CPU: 0 PID: 9831 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 887.746163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.755537] Call Trace: [ 887.758136] dump_stack+0x142/0x197 [ 887.761784] should_fail.cold+0x10f/0x159 [ 887.765949] should_failslab+0xdb/0x130 [ 887.769950] kmem_cache_alloc+0x2d7/0x780 [ 887.774118] ? lock_downgrade+0x740/0x740 [ 887.778276] get_empty_filp+0x8c/0x3f0 [ 887.782254] alloc_file+0x23/0x440 [ 887.782269] __shmem_file_setup.part.0+0x1b1/0x400 [ 887.782281] ? __alloc_fd+0x1d4/0x4a0 [ 887.790744] ? shmem_fill_super+0x8c0/0x8c0 [ 887.790762] SyS_memfd_create+0x1f9/0x3a0 [ 887.790773] ? shmem_fcntl+0x130/0x130 [ 887.790781] ? do_syscall_64+0x53/0x640 [ 887.790791] ? shmem_fcntl+0x130/0x130 [ 887.790801] do_syscall_64+0x1e8/0x640 14:15:00 executing program 4: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) 14:15:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f00000000c0)) pwrite64(r5, &(0x7f0000000040)="f9fabd02c93a75bee99a33eff5eaec8798d923e3439cd6bf0715e296b43c926df10b67efcba768e476a84dd62148f85503c885f25e14c020cc6ebfe89d8f7a6cc9db2df4d4bc4d3485e2903b82ceb2250b", 0x51, 0x7fffffff) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000100)=0xfffffffffffffeae) ioctl$USBDEVFS_REAPURBNDELAY(r4, 0x4008550d, &(0x7f0000000000)) [ 887.790809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.790825] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.799481] FAULT_INJECTION: forcing a failure. [ 887.799481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 887.803061] RIP: 0033:0x45a919 [ 887.803066] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 887.803076] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a919 [ 887.803082] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 14:15:00 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 887.803087] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 887.803093] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 887.803098] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 887.883134] CPU: 1 PID: 9834 Comm: syz-executor.0 Not tainted 4.14.160-syzkaller #0 [ 887.896075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.896079] Call Trace: [ 887.896097] dump_stack+0x142/0x197 [ 887.896112] should_fail.cold+0x10f/0x159 [ 887.896125] __alloc_pages_nodemask+0x1d6/0x7a0 [ 887.896137] ? __alloc_pages_slowpath+0x2930/0x2930 [ 887.896151] ? save_trace+0x290/0x290 [ 887.896165] alloc_pages_current+0xec/0x1e0 [ 887.896178] skb_page_frag_refill+0x1ef/0x490 [ 887.896189] sk_page_frag_refill+0x53/0x1c0 [ 887.896201] __ip6_append_data.isra.0+0x9cb/0x2af0 [ 887.896216] ? trace_hardirqs_on+0x10/0x10 [ 887.896231] ? ip6_setup_cork+0x12a0/0x12a0 [ 887.896238] ? find_held_lock+0x35/0x130 [ 887.896251] ip6_append_data+0x1c1/0x2f0 [ 887.920295] FAULT_INJECTION: forcing a failure. [ 887.920295] name failslab, interval 1, probability 0, space 0, times 0 [ 887.920652] ? rawv6_mh_filter_unregister+0x20/0x20 [ 887.920668] ? rawv6_mh_filter_unregister+0x20/0x20 [ 887.920683] rawv6_sendmsg+0x107c/0x2d10 [ 887.920702] ? rawv6_bind+0x850/0x850 [ 887.920715] ? avc_has_perm_noaudit+0x420/0x420 [ 887.997931] ? save_trace+0x290/0x290 [ 888.001723] ? lock_downgrade+0x740/0x740 [ 888.005870] ? __fget+0x210/0x370 [ 888.009326] ? find_held_lock+0x35/0x130 [ 888.013389] ? sock_has_perm+0x1ed/0x280 [ 888.017461] ? selinux_tun_dev_create+0xc0/0xc0 [ 888.022140] ? lock_downgrade+0x740/0x740 [ 888.026304] inet_sendmsg+0x122/0x500 [ 888.030106] ? inet_sendmsg+0x122/0x500 [ 888.034087] ? inet_recvmsg+0x500/0x500 [ 888.038070] sock_sendmsg+0xce/0x110 [ 888.041808] SYSC_sendto+0x206/0x310 [ 888.045523] ? SYSC_connect+0x2d0/0x2d0 [ 888.049491] ? lock_downgrade+0x740/0x740 [ 888.053643] ? wait_for_completion+0x420/0x420 [ 888.058241] ? __sb_end_write+0xc1/0x100 [ 888.062300] ? fput+0xd4/0x150 [ 888.065490] ? SyS_write+0x15e/0x230 [ 888.069200] SyS_sendto+0x40/0x50 [ 888.072647] ? SyS_getpeername+0x30/0x30 [ 888.076708] do_syscall_64+0x1e8/0x640 [ 888.080597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.085450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.090645] RIP: 0033:0x45a919 [ 888.093831] RSP: 002b:00007fd8211a6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 888.101535] RAX: ffffffffffffffda RBX: 00007fd8211a6c90 RCX: 000000000045a919 [ 888.108810] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 888.116081] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 888.123346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8211a76d4 [ 888.130609] R13: 00000000004c9abf R14: 00000000004e1a38 R15: 0000000000000004 [ 888.137900] CPU: 0 PID: 9844 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 888.145710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.155068] Call Trace: [ 888.157677] dump_stack+0x142/0x197 [ 888.161316] should_fail.cold+0x10f/0x159 [ 888.165486] should_failslab+0xdb/0x130 14:15:00 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 888.165499] kmem_cache_alloc+0x2d7/0x780 [ 888.173673] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 888.173684] ? check_preemption_disabled+0x3c/0x250 [ 888.173699] selinux_file_alloc_security+0xb4/0x190 [ 888.173709] security_file_alloc+0x6d/0xa0 [ 888.173720] get_empty_filp+0x162/0x3f0 [ 888.197371] alloc_file+0x23/0x440 [ 888.200930] __shmem_file_setup.part.0+0x1b1/0x400 [ 888.205866] ? __alloc_fd+0x1d4/0x4a0 [ 888.209687] ? shmem_fill_super+0x8c0/0x8c0 [ 888.214024] SyS_memfd_create+0x1f9/0x3a0 [ 888.218186] ? shmem_fcntl+0x130/0x130 [ 888.222071] ? do_syscall_64+0x53/0x640 [ 888.226031] ? shmem_fcntl+0x130/0x130 [ 888.229902] do_syscall_64+0x1e8/0x640 [ 888.233778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.238810] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.244082] RIP: 0033:0x45a919 [ 888.247274] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 888.254983] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a919 [ 888.262250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bf9b2 14:15:01 executing program 0 (fault-call:6 fault-nth:1): r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:01 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 888.269529] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 888.276787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 888.284061] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 14:15:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r8 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r8, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) 14:15:01 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 888.364995] FAULT_INJECTION: forcing a failure. [ 888.364995] name failslab, interval 1, probability 0, space 0, times 0 [ 888.378473] CPU: 1 PID: 9866 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 888.386838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.386845] Call Trace: [ 888.386869] dump_stack+0x142/0x197 [ 888.386888] should_fail.cold+0x10f/0x159 [ 888.386904] should_failslab+0xdb/0x130 [ 888.386913] kmem_cache_alloc+0x2d7/0x780 [ 888.386979] ? do_sys_ftruncate.constprop.0+0x35c/0x490 [ 888.386995] getname_flags+0xcb/0x580 [ 888.387010] getname+0x1a/0x20 [ 888.387022] do_sys_open+0x1e7/0x430 [ 888.387035] ? filp_open+0x70/0x70 [ 888.387049] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 888.387062] SyS_open+0x2d/0x40 [ 888.387070] ? do_sys_open+0x430/0x430 [ 888.387082] do_syscall_64+0x1e8/0x640 [ 888.387090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.387106] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.387113] RIP: 0033:0x4146b1 [ 888.387118] RSP: 002b:00007fd3c5cc0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 888.387129] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 00000000004146b1 [ 888.387135] RDX: 00007fd3c5cc0b0a RSI: 0000000000000002 RDI: 00007fd3c5cc0b00 [ 888.387140] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 888.387145] R10: 0000000000000075 R11: 0000000000000293 R12: 00007fd3c5cc16d4 [ 888.387151] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 888.426671] FAULT_INJECTION: forcing a failure. [ 888.426671] name failslab, interval 1, probability 0, space 0, times 0 [ 888.453911] CPU: 1 PID: 9869 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 888.460168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.460175] Call Trace: [ 888.460194] dump_stack+0x142/0x197 [ 888.460214] should_fail.cold+0x10f/0x159 [ 888.460229] should_failslab+0xdb/0x130 [ 888.460238] kmem_cache_alloc+0x2d7/0x780 [ 888.460248] ? save_stack+0xa9/0xd0 [ 888.460260] get_empty_filp+0x8c/0x3f0 [ 888.460270] path_openat+0x8f/0x3f70 [ 888.460291] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 888.460303] ? save_trace+0x290/0x290 [ 888.460317] ? __alloc_fd+0x1d4/0x4a0 [ 888.460330] do_filp_open+0x18e/0x250 [ 888.460340] ? may_open_dev+0xe0/0xe0 [ 888.460354] ? lock_downgrade+0x740/0x740 [ 888.460366] ? do_raw_spin_unlock+0x16b/0x260 [ 888.460377] ? _raw_spin_unlock+0x2d/0x50 [ 888.460385] ? __alloc_fd+0x1d4/0x4a0 [ 888.460404] do_sys_open+0x2c5/0x430 [ 888.474206] FAULT_INJECTION: forcing a failure. [ 888.474206] name failslab, interval 1, probability 0, space 0, times 0 [ 888.477722] ? filp_open+0x70/0x70 [ 888.477737] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 888.477748] SyS_open+0x2d/0x40 [ 888.477755] ? do_sys_open+0x430/0x430 [ 888.477770] do_syscall_64+0x1e8/0x640 [ 888.477778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.653128] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.658312] RIP: 0033:0x4146b1 [ 888.661491] RSP: 002b:00007fd3c5cc0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 888.669184] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 00000000004146b1 [ 888.676441] RDX: 00007fd3c5cc0b0a RSI: 0000000000000002 RDI: 00007fd3c5cc0b00 [ 888.683700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 888.690968] R10: 0000000000000075 R11: 0000000000000293 R12: 00007fd3c5cc16d4 [ 888.698942] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 888.707427] CPU: 0 PID: 9872 Comm: syz-executor.0 Not tainted 4.14.160-syzkaller #0 [ 888.715238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.724685] Call Trace: [ 888.727287] dump_stack+0x142/0x197 [ 888.730926] should_fail.cold+0x10f/0x159 [ 888.735068] should_failslab+0xdb/0x130 [ 888.739030] kmem_cache_alloc+0x47/0x780 [ 888.743102] ? lock_acquire+0x16f/0x430 [ 888.747083] ? check_preemption_disabled+0x3c/0x250 [ 888.752098] skb_clone+0x129/0x320 [ 888.755626] dev_queue_xmit_nit+0x2da/0x940 [ 888.759937] dev_hard_start_xmit+0xa7/0x8b0 [ 888.764247] ? check_preemption_disabled+0x30/0x250 [ 888.769252] __dev_queue_xmit+0x1d95/0x25e0 [ 888.773751] ? trace_hardirqs_on_caller+0x400/0x590 [ 888.778758] ? ip6t_do_table+0xaa6/0x1860 [ 888.782894] ? netdev_pick_tx+0x300/0x300 [ 888.787043] ? find_held_lock+0x35/0x130 [ 888.791097] ? ip6_finish_output+0x4f4/0xb50 [ 888.795508] ? mark_held_locks+0xb1/0x100 [ 888.799652] dev_queue_xmit+0x18/0x20 [ 888.803539] ? dev_queue_xmit+0x18/0x20 [ 888.807522] ip6_finish_output2+0x10bd/0x21b0 [ 888.812025] ? find_held_lock+0x35/0x130 [ 888.816094] ? ip6_forward_finish+0x480/0x480 [ 888.820579] ? lock_downgrade+0x740/0x740 [ 888.824735] ip6_finish_output+0x4f4/0xb50 [ 888.829648] ? ip6_finish_output+0x4f4/0xb50 [ 888.834042] ip6_output+0x20f/0x6d0 [ 888.837652] ? ip6_finish_output+0xb50/0xb50 [ 888.842055] ? ip6_output+0x6d0/0x6d0 [ 888.845839] ? ip6_fragment+0x32c0/0x32c0 [ 888.849974] ip6_local_out+0x97/0x170 [ 888.853761] ip6_send_skb+0xa2/0x330 [ 888.857460] ip6_push_pending_frames+0xbb/0xe0 [ 888.862039] rawv6_sendmsg+0x227b/0x2d10 [ 888.867478] ? rawv6_bind+0x850/0x850 [ 888.871275] ? avc_has_perm_noaudit+0x420/0x420 [ 888.875931] ? save_trace+0x290/0x290 [ 888.879712] ? lock_downgrade+0x740/0x740 [ 888.883842] ? __fget+0x210/0x370 [ 888.887288] ? find_held_lock+0x35/0x130 [ 888.891333] ? sock_has_perm+0x1ed/0x280 [ 888.895384] ? selinux_tun_dev_create+0xc0/0xc0 [ 888.900040] ? lock_downgrade+0x740/0x740 [ 888.904180] inet_sendmsg+0x122/0x500 [ 888.907961] ? inet_sendmsg+0x122/0x500 [ 888.911928] ? inet_recvmsg+0x500/0x500 [ 888.915888] sock_sendmsg+0xce/0x110 [ 888.919584] SYSC_sendto+0x206/0x310 [ 888.923282] ? SYSC_connect+0x2d0/0x2d0 [ 888.927261] ? lock_downgrade+0x740/0x740 [ 888.931408] ? wait_for_completion+0x420/0x420 [ 888.935993] ? __sb_end_write+0xc1/0x100 [ 888.940040] ? fput+0xd4/0x150 [ 888.943228] ? SyS_write+0x15e/0x230 [ 888.946935] SyS_sendto+0x40/0x50 [ 888.950372] ? SyS_getpeername+0x30/0x30 [ 888.954417] do_syscall_64+0x1e8/0x640 [ 888.958290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.963125] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:15:01 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 888.968301] RIP: 0033:0x45a919 [ 888.971490] RSP: 002b:00007fd8211a6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 888.979199] RAX: ffffffffffffffda RBX: 00007fd8211a6c90 RCX: 000000000045a919 [ 888.986461] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 888.994018] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 889.001722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8211a76d4 [ 889.008993] R13: 00000000004c9abf R14: 00000000004e1a38 R15: 0000000000000004 14:15:01 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) 14:15:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x3d9e40, 0x9, 0x9, 0x5}) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x6) r5 = memfd_create(&(0x7f0000000000)='/dev/vbi#\x00', 0x0) ftruncate(r5, 0x1000000) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendfile(r2, r5, 0x0, 0xeefffdef) [ 889.077662] FAULT_INJECTION: forcing a failure. [ 889.077662] name failslab, interval 1, probability 0, space 0, times 0 [ 889.109112] CPU: 1 PID: 9877 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 889.116952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.126404] Call Trace: [ 889.129009] dump_stack+0x142/0x197 [ 889.132655] should_fail.cold+0x10f/0x159 [ 889.136847] should_failslab+0xdb/0x130 [ 889.140968] kmem_cache_alloc+0x2d7/0x780 [ 889.145137] ? save_stack+0xa9/0xd0 [ 889.148784] get_empty_filp+0x8c/0x3f0 [ 889.152689] path_openat+0x8f/0x3f70 [ 889.156445] ? trace_hardirqs_on+0x10/0x10 [ 889.160785] ? check_preemption_disabled+0x3c/0x250 [ 889.165824] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 889.170506] ? find_held_lock+0x35/0x130 [ 889.174581] ? save_trace+0x290/0x290 [ 889.178394] ? __alloc_fd+0x1d4/0x4a0 [ 889.182299] do_filp_open+0x18e/0x250 [ 889.186137] ? may_open_dev+0xe0/0xe0 [ 889.186154] ? lock_downgrade+0x740/0x740 [ 889.186167] ? do_raw_spin_unlock+0x16b/0x260 [ 889.186178] ? _raw_spin_unlock+0x2d/0x50 [ 889.186189] ? __alloc_fd+0x1d4/0x4a0 [ 889.186210] do_sys_open+0x2c5/0x430 [ 889.194164] ? filp_open+0x70/0x70 [ 889.194181] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 889.194194] SyS_open+0x2d/0x40 [ 889.194203] ? do_sys_open+0x430/0x430 14:15:01 executing program 4 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:15:01 executing program 0 (fault-call:6 fault-nth:2): r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 889.194218] do_syscall_64+0x1e8/0x640 [ 889.203047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.203064] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 889.203071] RIP: 0033:0x4146b1 [ 889.203076] RSP: 002b:00007fd3c5cc0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 889.203086] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 00000000004146b1 [ 889.203091] RDX: 00007fd3c5cc0b0a RSI: 0000000000000002 RDI: 00007fd3c5cc0b00 [ 889.203096] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 14:15:02 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 889.203101] R10: 0000000000000075 R11: 0000000000000293 R12: 00007fd3c5cc16d4 [ 889.203107] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 14:15:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$unix(r1, &(0x7f0000000180), &(0x7f0000000080)=0x6e) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000200)='.\x00', 0x4add, 0x6, &(0x7f0000001600)=[{&(0x7f0000000280)="2f43c229ec8e18ddd3b48835f60d90ad068be3af0a3cf1f19a5ad18d3e66e5a1bd408e5e178d4c603c59c5c84b86856154402cecd3a91e501d54be87112db1de9b7eb0782dda743970771526a2261556612393f7", 0x54, 0x8}, {&(0x7f0000000400)="d4d777fe242265bdd8d8f29821dcbd6c521649b29fd958a4f29c945247823705a37f67d1e3b653bc436d163ddda15c0c2a442afd74ddefe88ebba7cdef0bd4d764aedf3e7f7013bcdaf4f694820eef037a40ab779f6a424f6fc11da62e15b37823ea7360007d62c268b5fcfc4a91ee511193140a2b70fe7996bcab7a6f95b482dabb1573aa195020ab3da5f0106fd0ba30bde28bd26df9f541eee7", 0x9b, 0x8}, {&(0x7f00000004c0)="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", 0x1000, 0x7}, {&(0x7f00000014c0)="29ab0f712495a64bb928ce1e2f76055f08630fb45ef46e65a7bdf9217dd4f7905bc89dfabcbff5ddc811f7bc13397cb7443891fbbb0322ebe2a5dc53d95c89e95f907d634e89d568ea6b8c843479f78782a282e751b31ccea5f8f08f0a0ae8ad251cda651c05cf695fbbb3f822105ce6d9fa44d39193d7bbf410b7447a96231f73919619c8b8fa6a44ad62e16c6933eedf3dc8fabaf5d56793a9f4c3c67e6b23be9d2907a61e685bbd974cc342d7abb1d66bb7ba6a19f31c", 0xb8}, {&(0x7f0000000300)="8056ce79327cdff76a42b2f4b9eeb02ee59e50df0f94a4cf8a8da3e0dc658be0179e051c93b460a87457df594b0a3b18112f0fff748cf2920d99ccc0992b519bea64a14530c962325aa84f5ae4c50bea923ea429a98ba435f444927617ff2126e58d78d88e736a88", 0x68, 0x20}, {&(0x7f0000001580)="e1eb15c33073eda1b0a9182726c0829e6699317663c674bf71f6471a87d4e9ec730551c5a7a7cad9a57352bf8ecd5f5ec66a40eff9e5dee05ad3755770c782a386995416f3dda2ece00e4959a42e57bb3740a4a3b16faad8e11b49985a4d5acb8fe14bf31f4365f992593e8ad4a80374ead9c1f4598b072c5d9d2cc1", 0x7c, 0x200}], 0x200000, &(0x7f0000001780)={[{@nodiscard='nodiscard'}, {@dax='dax'}, {@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@barrier='barrier'}, {@attr2='attr2'}, {@sysvgroups='sysvgroups'}, {@nolazytime='nolazytime'}, {@sunit={'sunit', 0x3d, 0x1}}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) [ 889.323088] FAULT_INJECTION: forcing a failure. [ 889.323088] name failslab, interval 1, probability 0, space 0, times 0 [ 889.336859] FAULT_INJECTION: forcing a failure. [ 889.336859] name failslab, interval 1, probability 0, space 0, times 0 [ 889.349812] CPU: 1 PID: 9900 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 889.357635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.367011] Call Trace: [ 889.369602] dump_stack+0x142/0x197 [ 889.373234] should_fail.cold+0x10f/0x159 [ 889.377381] should_failslab+0xdb/0x130 [ 889.381356] kmem_cache_alloc+0x2d7/0x780 [ 889.385503] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 889.390958] ? check_preemption_disabled+0x3c/0x250 [ 889.395984] selinux_file_alloc_security+0xb4/0x190 [ 889.401010] security_file_alloc+0x6d/0xa0 [ 889.405264] get_empty_filp+0x162/0x3f0 [ 889.409231] path_openat+0x8f/0x3f70 [ 889.412934] ? trace_hardirqs_on+0x10/0x10 [ 889.417156] ? check_preemption_disabled+0x3c/0x250 [ 889.422174] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 889.426840] ? find_held_lock+0x35/0x130 [ 889.430892] ? save_trace+0x290/0x290 [ 889.434691] ? __alloc_fd+0x1d4/0x4a0 [ 889.438478] do_filp_open+0x18e/0x250 [ 889.442276] ? may_open_dev+0xe0/0xe0 [ 889.446080] ? lock_downgrade+0x740/0x740 [ 889.450259] ? do_raw_spin_unlock+0x16b/0x260 [ 889.454761] ? _raw_spin_unlock+0x2d/0x50 [ 889.458900] ? __alloc_fd+0x1d4/0x4a0 [ 889.462786] do_sys_open+0x2c5/0x430 [ 889.466497] ? filp_open+0x70/0x70 [ 889.470045] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 889.475432] SyS_open+0x2d/0x40 [ 889.478704] ? do_sys_open+0x430/0x430 [ 889.482585] do_syscall_64+0x1e8/0x640 [ 889.486470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.491319] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 889.496503] RIP: 0033:0x4146b1 [ 889.499682] RSP: 002b:00007fd3c5cc0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 889.507387] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 00000000004146b1 [ 889.510176] net_ratelimit: 16 callbacks suppressed 14:15:02 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 889.510181] protocol 88fb is buggy, dev hsr_slave_0 [ 889.514648] RDX: 00007fd3c5cc0b0a RSI: 0000000000000002 RDI: 00007fd3c5cc0b00 [ 889.514654] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 889.514660] R10: 0000000000000075 R11: 0000000000000293 R12: 00007fd3c5cc16d4 [ 889.514666] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 889.539344] protocol 88fb is buggy, dev hsr_slave_1 [ 889.554154] protocol 88fb is buggy, dev hsr_slave_0 [ 889.564266] protocol 88fb is buggy, dev hsr_slave_1 [ 889.585196] FAULT_INJECTION: forcing a failure. [ 889.585196] name failslab, interval 1, probability 0, space 0, times 0 [ 889.587342] CPU: 0 PID: 9901 Comm: syz-executor.4 Not tainted 4.14.160-syzkaller #0 [ 889.604211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.613576] Call Trace: [ 889.616164] dump_stack+0x142/0x197 [ 889.619825] should_fail.cold+0x10f/0x159 [ 889.623978] should_failslab+0xdb/0x130 [ 889.627939] __kmalloc+0x2f0/0x7a0 [ 889.631471] ? mutex_trylock+0x168/0x1c0 [ 889.635615] ? tty_write_lock+0x20/0x60 [ 889.639586] ? tty_write+0x4b1/0x700 [ 889.643294] tty_write+0x4b1/0x700 [ 889.646837] ? process_echoes+0x150/0x150 [ 889.650986] __vfs_write+0x105/0x6b0 [ 889.654697] ? tty_read+0x270/0x270 [ 889.658311] ? kernel_read+0x120/0x120 [ 889.662193] ? __inode_security_revalidate+0xd6/0x130 [ 889.667376] ? avc_policy_seqno+0x9/0x20 [ 889.671448] ? selinux_file_permission+0x85/0x480 [ 889.676287] ? security_file_permission+0x89/0x1f0 [ 889.681215] ? rw_verify_area+0xea/0x2b0 [ 889.685265] vfs_write+0x198/0x500 [ 889.688800] SyS_write+0xfd/0x230 [ 889.692269] ? SyS_read+0x230/0x230 [ 889.695899] ? do_syscall_64+0x53/0x640 [ 889.699887] ? SyS_read+0x230/0x230 [ 889.703512] do_syscall_64+0x1e8/0x640 [ 889.707395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.712229] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 889.717415] RIP: 0033:0x45a919 [ 889.720597] RSP: 002b:00007fb77941fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 889.728398] RAX: ffffffffffffffda RBX: 00007fb77941fc90 RCX: 000000000045a919 14:15:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4, 0x0, @dev={0xfe, 0x80, [], 0x21}}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 889.735787] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 889.743056] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 889.750323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7794206d4 [ 889.757578] R13: 00000000004c7c83 R14: 00000000004e4e40 R15: 0000000000000005 [ 889.764851] CPU: 1 PID: 9908 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 889.772659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.782019] Call Trace: [ 889.784613] dump_stack+0x142/0x197 [ 889.788260] should_fail.cold+0x10f/0x159 [ 889.792430] should_failslab+0xdb/0x130 [ 889.796400] kmem_cache_alloc_trace+0x2e9/0x790 [ 889.801067] ? __lockdep_init_map+0x10c/0x570 [ 889.815753] ? loop_get_status64+0x120/0x120 [ 889.820171] __kthread_create_on_node+0xe3/0x3e0 [ 889.824929] ? kthread_park+0x140/0x140 [ 889.828889] ? __fget+0x210/0x370 [ 889.832333] ? loop_get_status64+0x120/0x120 [ 889.836730] kthread_create_on_node+0xa8/0xd0 [ 889.841218] ? __kthread_create_on_node+0x3e0/0x3e0 [ 889.846237] ? __lockdep_init_map+0x10c/0x570 [ 889.850732] lo_ioctl+0xcf7/0x1ce0 [ 889.854298] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 889.859300] ? loop_probe+0x160/0x160 [ 889.863859] blkdev_ioctl+0x96b/0x1860 [ 889.867745] ? blkpg_ioctl+0x980/0x980 [ 889.871722] ? __might_sleep+0x93/0xb0 [ 889.875656] ? __fget+0x210/0x370 [ 889.879097] block_ioctl+0xde/0x120 [ 889.882724] ? blkdev_fallocate+0x3b0/0x3b0 [ 889.887046] do_vfs_ioctl+0x7ae/0x1060 [ 889.890944] ? selinux_file_mprotect+0x5d0/0x5d0 [ 889.895685] ? lock_downgrade+0x740/0x740 [ 889.899817] ? ioctl_preallocate+0x1c0/0x1c0 [ 889.904213] ? __fget+0x237/0x370 [ 889.907713] ? security_file_ioctl+0x89/0xb0 [ 889.912628] SyS_ioctl+0x8f/0xc0 [ 889.915997] ? do_vfs_ioctl+0x1060/0x1060 [ 889.920139] do_syscall_64+0x1e8/0x640 [ 889.924028] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.928887] entry_SYSCALL_64_after_hwframe+0x42/0xb7 14:15:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) r7 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r7, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) 14:15:02 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 889.934074] RIP: 0033:0x45a787 [ 889.937245] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 889.944940] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 889.952190] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 889.959461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 889.966718] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 889.973973] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 14:15:02 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000000)={{0xb05b733b49da066c, @addr=0x8000}, 0x8, 0xffff, 0x4}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000200)='-vboxne+0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x6) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000080)={0x1, 0x0, {0x7, 0x8, 0x9, 0xfffff000}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) sendmmsg$inet6(r4, &(0x7f0000002600)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x9, @ipv4={[], [], @multicast1}}, 0x1c, &(0x7f0000000280), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="280000000000000029000000360000005e020000000000000401f1c20400000020000100050200091400000000000000290000000b000000000000070000000070000000000000002900000036000000000a0000000000000740000000060e0309000100008000000000ffff0000000000000800000000000000e3c6000000020000ffff000000000000ff0f0000000000004e0a000000000000010400000000050204000401fd05020f840000000000"], 0xb0}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty, 0xd515}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)}, {&(0x7f0000000400)="91e68e343f0f451270a711c3b4df8201cf", 0x11}], 0x2, &(0x7f0000000600)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x13, 0xa, 0x2, 0xfb, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="8e4881cc91cbe8d18afba0440b1a8264", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}], 0x68}}, {{&(0x7f0000000680)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x471daff8}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000d80)="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", 0x1000}, {&(0x7f0000000740)}, {&(0x7f0000000840)="6a450ae7929013d2a8ec72a23e9751a82b0565ae7288065ddec49ea252bd384c9e26c1f12dc0cd9709691bf6c087602330c4cdd47b7690f399a92f6dcf46ca3a0364f79ab267ccff85e7b709d5fa081835e9834969ede28b4929d4f8c153214d992edbbbf1f3077ff792d1f2afde70199c8a28d9c3b85e9188dd9494902ba1fd20487acd0c0b38d5af84804a39b0d7d2b54e439dd2b17d0460dcbf63b35c5c629ee2477d402770f9b727294578bec05eab9d31c4f9", 0xb5}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/463, @ANYRES32=r5, @ANYBLOB], 0x1d3}}, {{&(0x7f0000000d00)={0xa, 0x4e20, 0x0, @remote, 0xefdd}, 0x1c, &(0x7f0000001f40)=[{&(0x7f0000001d80)}, {0x0}, {&(0x7f0000001e80)="95625d6469be24556962472f7ce3b4b4b5ba763e3c6e1aa3598bf4e47182226d9b20fafb", 0x24}, {&(0x7f0000001ec0)="b9c71c3a0ea94bef2f823d9fba571b98a1bdbcc6c66ae89f424fe5930fc447210132141403973da6bd588c17a5cf0ec42553a3987488a4d181764ea2", 0x3c}], 0x4}}, {{&(0x7f0000001f80)={0xa, 0x4e24, 0x9, @empty}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000001fc0)="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", 0xff}, {&(0x7f0000002140)="a2e5917bc44da94b877617b83143cbc459f8682c07c0a2f04754fbc484e9f3cca6a669e7566a736d4ae2ee6c5aa011fb132bcc4c3e01d8128b91a95f2226db2e504e59947639c2a3ce9a23e9f747ecc6ae6b638fc24c9a5f0a01a54970978252f83b7da5d4e1797cb01b2fe1a881a9ed1a178927dd73c57077ca97ecb6035c5afceb7ccf72f56dbd4679d41f791727d126e972d63312b94d369b479cc86ee9ea02f75dbdb7", 0xa5}, {&(0x7f0000002200)="fcbe725b50f65d8d221f46273250e582805e53680f257beeca3e212a05546030339136660dd901bedbca1f545d736dee45a2791441495fd557eadc08e99e544d23f2805ca9d853e4ac99b0d23ca619b4aaa10a91c6a57cd2fdce6ea31eedbcd9d51f765f60a74f76e89dd0880197", 0x6e}, {0x0}, {&(0x7f0000002380)="45db0f5ce8fb4319412fd49d64f1c19ee85a3eb8af73f66ffad07199", 0x1c}], 0x5, &(0x7f0000002580)=[@hopopts={{0x40, 0x29, 0x36, {0xa0, 0x4, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x81, 0x0}}, @hao={0xc9, 0x10, @loopback}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x12}}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}], 0x80}}], 0x5, 0x40000) sendmmsg$inet(r3, &(0x7f0000002080)=[{{&(0x7f00000000c0)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="7933b5129fb574ed4bb30d400ba0fccbfc47f6b4ea3cd84946ca852bde2f2d265edc4871161355660499d18342f21d53a861335258733654a49da11f646c42d167aaa5b149175b812f339ece0212851452fcf50ce7886d06df521c3da5a6df7b92b792bf88e6954a837930a9174b920922db8aaed84e53b2f0fa3765db500ffb708dadebd4", 0x85}, {&(0x7f0000000300)="ed9ec639a4815882d367c82139675ac212d7e9829d6b13160e1f9bf2c761e851ec6a409031ab3dae17c5a6c9fef51d30c14b6e2808097b2cf01c44097b242e2b498f7c9e64f4d77c88425625f6377de0d9594fd11bf6993598b83abe27ccbc238a33f25ae86c18090f03c8f7f938a85cdf355a201328b70b48daf6599e4d2c4bf5fd9a28dd875f67cff0c589c2ce3c6c8d97619aa84462b0121b2a77361cca6a3194e1af12d5d55d17110cd7c7b4574111b017e41e877b3470088217d456e71425e9a70e9e5843e7a756", 0xca}, {&(0x7f0000000480)="846c5743f95e70691f069bd1b5cea614299ce4f56b85c73173da8aff3f340c4f91727cd86bef5ab8148c6042c8a1b527aa4d33376bd74ee25a5196608e43bf0c812e3e1614215e9b1b40c959ff4427b46a13bbd7e6b8b928ef4676474292fddea9f0003d3dd165278cd058d36f2641dcdc018fafb67169f7afd90816f652725b2d791ca9f912ee42206055d48a2340f06177c680f7b40ff048809a01", 0x9c}], 0x3, &(0x7f0000000540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x12}, @broadcast}}}], 0x20}}, {{&(0x7f0000000580)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000780)=[{&(0x7f00000005c0)="95234ef8ed7b1ab5089135569dfc8e9759032016c84b8c32f94a6eb5032fd0dc1fe9c7528df785067c1a3db4f8ba425a1cbc33f7f6fc542d86bb3195acf56c61b2094f49eb0a530531a0aa0ed3efcc80430fca6c7a563736b05af542d29869ca7316362e7aee369dffb722", 0x6b}, {&(0x7f0000000640)="9e0dcd7885ab841fbd50c94950b05311085f72fa4b2b471de4b9da0842fbb4e3cdbd36a205cb2119d71a6237f0ec50b8b3782ddb260a607eb587b72b39c7970b4c4e6570b4bcf16582a34898646877f3b13fa39e58d610eb68208e407d72d075f96aad9dae627977488c3ca2d2b7ca6ae4978a51d906ff5eaca66e578f52786d41ff5b976c2a576976dafd304ee6f98e3e677f3b77010fecc1f78b0702c98133e33a45e895b3ffe6394149a61b2f55032cb9c1303824675038998d719cf57b525b76001a85a46748ce", 0xc9}, {&(0x7f0000000740)="6f7168564afd4005a9b3b5333a7441014a41d2667d91435ef91b292769030c5256a4f523ea310a377f594bf40c76f0b7911246a14948e2d4afab95e9f1", 0x3d}], 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)="65ee2c577de466b4ceb66ecb3cd313c2f4626a1a51dc53093cd950529411ce0c77b71087f5ff5d519c168ac8a6a75a30fe6e3cc105b9e14c4d3a2fe2247d62f31518bd89e7e06346f7e5050db2d6a4a9ebd26a889efdd5f1a38f8ab2120f1ed9504bfe1346bc28142138ef4b12708546ffa3f6567622c9d28a2d6d08c848da178db01af2ac1491e04f364919093557b39ecffbcc36ec3357a4790c7b040d567649e5abaf6a0dc6a06ff473b67eb99225cef45fa63a98ca1f02d6ead0bd30dc09c3f45ce2fd6133a6fa1aef6418d542f956df78409f5ef098a59138b471baa42ed113b59256e79643dd719442a9f3a184", 0xf0}], 0x1}}, {{&(0x7f0000000900)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000940)="32a9273ca21af06d352df83517c34a81ab5f4f74e1bbe25571a060e9c88023a66cb9633ce6a70f6e79fa6168009b8dbac6daf36f5595874d707f0b7940c3fb718472ef7fa818ea4cf25257f2470001e39042356c002196c02e55bd06e8ad095ecdb6b3e51bb9aa7d", 0x68}, {&(0x7f00000009c0)="c7f3ec9786ed03de68d5ff2e8370df38632938be2c7e1d60d6a17f594158a7cf60542765f221ceaf9e79138498cead82802908f2416e53a246d89b7732b989edd48350e1f6825912e3850f2dab97466d482476bc594539ac39f677c5702d7a22359e1d081e8cc80d54caaa80f84b3d4a11638061d51bf041ae4bb19031983a7df3ee876817fc4b4556cdd0842718b071fef6cd3d7d756e50b599dd70b4775d54e8e79d8d7e83b74d8e847185d8ab", 0xae}, {&(0x7f0000000a80)="8b62c08b86551304a81b302456bbe132504612660465d58c6450aa1cc1d09e578bebcd98f246343e64620c78040291511a8a0bdd46331d84689933db8f2eb0d7e2acef2d3a0e279b21ced7058b6b29d1c8dc1074781e9207ee5793fbcf2cde7c", 0x60}, {&(0x7f0000000b00)="a70ee2033cb97216b84b1787929327a6fbee83d64123eeba89247d2532536a3f237c08af13e571f98aa58184262a15db5dc90c5177377b2b02e5cb990baed39cdf0ac9163bf8a6471df7a9b7f28e2419b3afbc5c760b81a43379f6c2fd4d2bce221138dd9f3519e0c9125572a2c501505ca151dd7506ef2a9dac9d48d46a376c13c767590cf73dc4f8dd96690323c5c19d23af061ad59bb35b85358d30f1ab91e96181", 0xa3}, {&(0x7f0000000bc0)="7f8c743dc37be15ae14239cb26b4039d4dac68d9c8768660225ac8f85b4c6bcf42c13f5e6ac340db463002c4408ed9168b68cdd770", 0x35}], 0x5}}, {{0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000c80)="6d6fc09f580768088763c79a2d2e9b8d89830857042448a5eb54f252ec837c2edb5b79affec60df53194df1861256a81015259d141bf87385691c7558f992a6dde037e5a0d3bacdc7b6f6c33554dcf65b275af347b3127df63876dd43473a8137df26d31e2f9c3cf94928df7465989e3e832eb3b272ab8fc2f0ce02a4d5198d00f93fdf665c3fd", 0x87}, {&(0x7f0000000d40)="1724b31eeff1c1d757b3bab1ae7794d59caab843beb04498b6117e22e3269972cb254b2eef6dda4bde1b24e85b3f4adf8e7ae01e07d6cfe8fd929a0be1d5a76b2c4efaca1db26fd5e22bb577d7b287d4de62bcb75d2a", 0x56}, {&(0x7f0000000dc0)="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", 0x1000}, {&(0x7f0000001dc0)="3f624bea0680843a671c18e5c944d77a354d456ac4cb702d6c598dbc0890f45cf6d26ebbf769690d50f215c12a741c04d0ab1a8c2bc44ab2aac6e7cf63a39bd11fe20aaabf43e66228f65aad2bcfe3d418de2d74e664ef139e6bfeb5028e18a4397d35d09ef5f4eb53cdfc8dd49dd2793a7e4048496fc544311d8951ff448fb1cd22f50356484714031e581e03f8ca99fe8f19a37918fdea19cf52d4e2e1e6588a4d68f4832a209434fba91688af6014c363248ce56b00b0fcea9807", 0xbc}, {&(0x7f0000001e80)="dc3656ab66db4197b74613031c02a1cac05cb0ae13c6003d34d2244d0a4bc53b327c8ed6432ddf676f76882436c6df43d5007dfcba86e02e28a80feac04baa9ef3b84b0223dad46dcab304a7a5d99b0cd06e777cf5a3029f14f96f1f8f3984ea7c1f7b4ad9dc43a85891ebe4716b82c7cad924926a2a056783310f59880721de033f6a6cbb9d3d7fcad2f8829270e8091b1a6f0bad1c751ae5f13c15870c85d87f83708b4d", 0xa5}, {&(0x7f0000001f40)="6e448b6f4078cb5d", 0x8}, {&(0x7f0000001f80)="80dd760c425c2825178cc7f5ee996b448e977578216d92ccb7e9fb4ef24fc8be92ed2877d3c2c4bfc5b0c4cc36e28898e8881ffe00cb1beed5974d048d14bb3e11585c6ef8662ad42618cb959696ca96b46fb130dd668e52cf3d40a84cd0f47b3ecd88cda3e79c522b058fc45d7c", 0x6e}], 0x7}}], 0x5, 0x20040800) r6 = memfd_create(&(0x7f0000000440)='/dev/vbi#\x00', 0x7) ftruncate(r6, 0x1000000) sendfile(r2, r6, 0x0, 0x8) 14:15:02 executing program 4 (fault-call:8 fault-nth:1): perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) [ 890.095232] FAULT_INJECTION: forcing a failure. [ 890.095232] name failslab, interval 1, probability 0, space 0, times 0 [ 890.116064] CPU: 0 PID: 9921 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 890.123902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.133265] Call Trace: [ 890.135867] dump_stack+0x142/0x197 [ 890.139524] should_fail.cold+0x10f/0x159 [ 890.143696] should_failslab+0xdb/0x130 [ 890.147682] kmem_cache_alloc+0x2d7/0x780 [ 890.151954] ? trace_hardirqs_on+0x10/0x10 [ 890.156204] ? save_trace+0x290/0x290 [ 890.160098] __kernfs_new_node+0x70/0x480 [ 890.164261] kernfs_new_node+0x80/0xf0 [ 890.168156] kernfs_create_dir_ns+0x41/0x140 [ 890.172578] internal_create_group+0xea/0x7b0 [ 890.177090] sysfs_create_group+0x20/0x30 [ 890.181254] lo_ioctl+0x1176/0x1ce0 [ 890.184897] ? loop_probe+0x160/0x160 [ 890.188707] blkdev_ioctl+0x96b/0x1860 [ 890.192604] ? blkpg_ioctl+0x980/0x980 [ 890.194598] FAULT_INJECTION: forcing a failure. [ 890.194598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 890.196504] ? __might_sleep+0x93/0xb0 [ 890.196515] ? __fget+0x210/0x370 [ 890.196530] block_ioctl+0xde/0x120 [ 890.196541] ? blkdev_fallocate+0x3b0/0x3b0 [ 890.196551] do_vfs_ioctl+0x7ae/0x1060 [ 890.196563] ? selinux_file_mprotect+0x5d0/0x5d0 [ 890.196573] ? lock_downgrade+0x740/0x740 [ 890.196591] ? ioctl_preallocate+0x1c0/0x1c0 [ 890.196603] ? __fget+0x237/0x370 [ 890.196620] ? security_file_ioctl+0x89/0xb0 [ 890.248912] SyS_ioctl+0x8f/0xc0 [ 890.252270] ? do_vfs_ioctl+0x1060/0x1060 [ 890.256426] do_syscall_64+0x1e8/0x640 [ 890.260315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.265154] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.270333] RIP: 0033:0x45a787 [ 890.273506] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 890.281204] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 890.288473] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:15:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000000)={0xfff, 0xc, 0x23, "5ea46306747777dc90499feca0e31efe94a6f721a95bf882624f0fa50a1fb3c1eba64f292037e56f1d46c4e8a2ff48a3f1718a242297725f5f750495", 0x14, "a49868632447f533f6be5cc580a5b52cdaebac5cef1d2a9fe0acc271d5b8b0364b214bbe4a510ebed50a61ea661377c9b629686e0ff2297226b07c6c"}) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0xeefffdef) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) [ 890.295732] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 890.303511] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 890.310764] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 890.318063] CPU: 1 PID: 9934 Comm: syz-executor.4 Not tainted 4.14.160-syzkaller #0 [ 890.325875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.335226] Call Trace: [ 890.335245] dump_stack+0x142/0x197 [ 890.335266] should_fail.cold+0x10f/0x159 [ 890.341454] ? __might_sleep+0x93/0xb0 [ 890.341468] __alloc_pages_nodemask+0x1d6/0x7a0 [ 890.341478] ? save_trace+0x290/0x290 [ 890.341487] ? __alloc_pages_slowpath+0x2930/0x2930 [ 890.341559] ? is_bpf_text_address+0x7f/0x120 [ 890.341572] ? is_bpf_text_address+0x7f/0x120 [ 890.352758] JFS: discard option not supported on device [ 890.354245] alloc_pages_current+0xec/0x1e0 [ 890.354259] pte_alloc_one+0x1a/0x100 [ 890.354273] do_huge_pmd_anonymous_page+0x84f/0x1200 [ 890.361563] JFS: discard option not supported on device [ 890.363092] ? is_bpf_text_address+0xa6/0x120 [ 890.363107] ? thp_get_unmapped_area+0x1c0/0x1c0 [ 890.363119] ? pmd_val+0xe0/0xe0 [ 890.378493] jfs: Unrecognized mount option "d" or missing value [ 890.381796] __handle_mm_fault+0x247d/0x33d0 [ 890.381809] ? copy_page_range+0x1de0/0x1de0 [ 890.381820] ? find_held_lock+0x35/0x130 [ 890.381829] ? handle_mm_fault+0x1b6/0x7c0 [ 890.381851] handle_mm_fault+0x293/0x7c0 [ 890.436041] __do_page_fault+0x4c1/0xb80 [ 890.440103] ? vmalloc_fault+0xe30/0xe30 [ 890.444155] do_page_fault+0x71/0x511 [ 890.447944] page_fault+0x25/0x50 [ 890.451380] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 890.457286] RSP: 0018:ffff888098bb7c10 EFLAGS: 00010206 [ 890.462643] RAX: 0000000000000000 RBX: 0000000020c34fff RCX: 0000000000000800 [ 890.469900] RDX: 0000000000000800 RSI: 0000000020c34fff RDI: ffff88804f60c440 [ 890.477163] RBP: ffff888098bb7c40 R08: ffffed1009ec1988 R09: 0000000000000000 [ 890.484430] R10: ffffed1009ec1987 R11: ffff88804f60cc3f R12: 0000000000000800 [ 890.491692] R13: ffff88804f60c440 R14: 00007ffffffff000 R15: 0000000020c357ff [ 890.498973] ? _copy_from_user+0xc5/0x110 [ 890.503175] tty_write+0x3b4/0x700 [ 890.506701] ? process_echoes+0x150/0x150 [ 890.510841] __vfs_write+0x105/0x6b0 [ 890.514549] ? tty_read+0x270/0x270 [ 890.518168] ? kernel_read+0x120/0x120 [ 890.522042] ? __inode_security_revalidate+0xd6/0x130 [ 890.527240] ? avc_policy_seqno+0x9/0x20 [ 890.531300] ? selinux_file_permission+0x85/0x480 [ 890.536258] ? security_file_permission+0x89/0x1f0 [ 890.541531] ? rw_verify_area+0xea/0x2b0 [ 890.545586] vfs_write+0x198/0x500 [ 890.549115] SyS_write+0xfd/0x230 [ 890.552564] ? SyS_read+0x230/0x230 [ 890.556177] ? do_syscall_64+0x53/0x640 [ 890.560144] ? SyS_read+0x230/0x230 [ 890.563762] do_syscall_64+0x1e8/0x640 [ 890.567645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.572484] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.577671] RIP: 0033:0x45a919 [ 890.580852] RSP: 002b:00007fb77941fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 890.588550] RAX: ffffffffffffffda RBX: 00007fb77941fc90 RCX: 000000000045a919 14:15:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) 14:15:03 executing program 4 (fault-call:8 fault-nth:2): perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) [ 890.595826] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 890.603083] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 890.610340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7794206d4 [ 890.617689] R13: 00000000004c7c83 R14: 00000000004e4e40 R15: 0000000000000005 14:15:03 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="34000000030000000000004000000000000000000000000013000000000000006b657972696e672c73656c667472757374656400"], 0x34) [ 890.710129] protocol 88fb is buggy, dev hsr_slave_0 [ 890.715380] protocol 88fb is buggy, dev hsr_slave_1 [ 890.772607] FAULT_INJECTION: forcing a failure. [ 890.772607] name failslab, interval 1, probability 0, space 0, times 0 [ 890.784570] CPU: 0 PID: 9957 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 890.792795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.792843] Call Trace: [ 890.792861] dump_stack+0x142/0x197 [ 890.792880] should_fail.cold+0x10f/0x159 [ 890.792893] ? radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 890.792911] should_failslab+0xdb/0x130 [ 890.792923] kmem_cache_alloc+0x47/0x780 [ 890.792932] ? save_stack+0x45/0xd0 [ 890.792939] ? kasan_kmalloc+0xce/0xf0 [ 890.792947] ? kasan_slab_alloc+0xf/0x20 [ 890.792955] ? kmem_cache_alloc+0x12e/0x780 [ 890.792965] ? __kernfs_new_node+0x70/0x480 [ 890.792973] ? kernfs_new_node+0x80/0xf0 [ 890.792982] ? kernfs_create_dir_ns+0x41/0x140 [ 890.792996] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 890.793010] idr_get_free_cmn+0x5a4/0x8e0 [ 890.793029] idr_alloc_cmn+0x10e/0x210 [ 890.793041] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 890.793056] ? __lock_is_held+0xb6/0x140 [ 890.793065] ? check_preemption_disabled+0x3c/0x250 [ 890.793079] idr_alloc_cyclic+0xd0/0x1e2 [ 890.793093] ? ida_simple_remove+0x60/0x60 [ 890.793109] __kernfs_new_node+0xb0/0x480 [ 890.793123] kernfs_new_node+0x80/0xf0 [ 890.793136] kernfs_create_dir_ns+0x41/0x140 [ 890.793149] internal_create_group+0xea/0x7b0 [ 890.793168] sysfs_create_group+0x20/0x30 [ 890.793180] lo_ioctl+0x1176/0x1ce0 [ 890.793194] ? loop_probe+0x160/0x160 [ 890.793206] blkdev_ioctl+0x96b/0x1860 [ 890.793217] ? blkpg_ioctl+0x980/0x980 [ 890.793233] ? __might_sleep+0x93/0xb0 [ 890.793243] ? __fget+0x210/0x370 [ 890.793258] block_ioctl+0xde/0x120 [ 890.793269] ? blkdev_fallocate+0x3b0/0x3b0 [ 890.793280] do_vfs_ioctl+0x7ae/0x1060 [ 890.793292] ? selinux_file_mprotect+0x5d0/0x5d0 [ 890.793301] ? lock_downgrade+0x740/0x740 [ 890.793313] ? ioctl_preallocate+0x1c0/0x1c0 [ 890.793326] ? __fget+0x237/0x370 14:15:03 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:15:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 890.793343] ? security_file_ioctl+0x89/0xb0 [ 890.793356] SyS_ioctl+0x8f/0xc0 [ 890.793366] ? do_vfs_ioctl+0x1060/0x1060 [ 890.793379] do_syscall_64+0x1e8/0x640 [ 890.793389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.793406] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.793414] RIP: 0033:0x45a787 [ 890.793420] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 890.793432] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 890.793437] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:15:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0xb8769000) [ 890.793443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 890.793449] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 890.793455] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 890.821860] FAULT_INJECTION: forcing a failure. [ 890.821860] name failslab, interval 1, probability 0, space 0, times 0 [ 890.827476] JFS: discard option not supported on device [ 890.852590] JFS: discard option not supported on device [ 890.866061] CPU: 1 PID: 9964 Comm: syz-executor.4 Not tainted 4.14.160-syzkaller #0 [ 890.868383] jfs: Unrecognized mount option "d" or missing value [ 890.872183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.872188] Call Trace: [ 890.872210] dump_stack+0x142/0x197 [ 890.872229] should_fail.cold+0x10f/0x159 [ 890.872246] should_failslab+0xdb/0x130 [ 890.872255] kmem_cache_alloc+0x2d7/0x780 [ 890.872264] ? is_bpf_text_address+0x7f/0x120 [ 890.872279] ptlock_alloc+0x20/0x70 [ 890.872290] pte_alloc_one+0x60/0x100 14:15:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x3, {{0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, {{0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x84f4}}}, 0x108) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000180)={0x6, 0x8, {0x55, 0x1ff, 0x1ff, {0x8000, 0x3cd1}, {0x8000, 0xb7}, @const={0x1ff, {0x5, 0x1ff, 0x8001, 0x1}}}, {0x57, 0xc6, 0x7ff, {0x4, 0x6}, {0xffff, 0x2000}, @period={0x5a, 0x8, 0x1, 0x2, 0x400, {0x4, 0x20, 0x6, 0x511}, 0x2, &(0x7f0000000000)=[0x0, 0x9]}}}) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet6_int(r2, 0x29, 0x7, &(0x7f0000000080)=0x200, 0x4) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 890.872299] do_huge_pmd_anonymous_page+0x84f/0x1200 [ 890.872309] ? is_bpf_text_address+0xa6/0x120 [ 890.872320] ? thp_get_unmapped_area+0x1c0/0x1c0 [ 890.872328] ? pmd_val+0xe0/0xe0 [ 890.872341] __handle_mm_fault+0x247d/0x33d0 [ 890.872354] ? copy_page_range+0x1de0/0x1de0 [ 890.872366] ? find_held_lock+0x35/0x130 [ 890.872376] ? handle_mm_fault+0x1b6/0x7c0 [ 890.872399] handle_mm_fault+0x293/0x7c0 [ 890.872410] __do_page_fault+0x4c1/0xb80 [ 890.872422] ? vmalloc_fault+0xe30/0xe30 [ 890.872435] do_page_fault+0x71/0x511 [ 890.885228] page_fault+0x25/0x50 [ 890.885244] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 890.885250] RSP: 0018:ffff888021e1fc10 EFLAGS: 00010206 [ 890.885261] RAX: 0000000000000000 RBX: 0000000020c34fff RCX: 0000000000000800 [ 890.885268] RDX: 0000000000000800 RSI: 0000000020c34fff RDI: ffff888081bd9100 [ 890.885273] RBP: ffff888021e1fc40 R08: ffffed101037b320 R09: 0000000000000000 [ 890.885282] R10: ffffed101037b31f R11: ffff888081bd98ff R12: 0000000000000800 [ 890.915628] R13: ffff888081bd9100 R14: 00007ffffffff000 R15: 0000000020c357ff [ 890.915657] ? _copy_from_user+0xc5/0x110 [ 890.915672] tty_write+0x3b4/0x700 [ 890.915686] ? process_echoes+0x150/0x150 [ 890.915700] __vfs_write+0x105/0x6b0 [ 890.923601] ? tty_read+0x270/0x270 [ 890.923615] ? kernel_read+0x120/0x120 [ 890.923627] ? __inode_security_revalidate+0xd6/0x130 [ 890.923637] ? avc_policy_seqno+0x9/0x20 [ 890.923645] ? selinux_file_permission+0x85/0x480 [ 890.923658] ? security_file_permission+0x89/0x1f0 [ 891.101696] audit: type=1400 audit(1577110503.806:68): avc: denied { map } for pid=9978 comm="syz-executor.1" path="socket:[122095]" dev="sockfs" ino=122095 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 [ 891.105299] ? rw_verify_area+0xea/0x2b0 [ 891.105318] vfs_write+0x198/0x500 [ 891.105332] SyS_write+0xfd/0x230 [ 891.105341] ? SyS_read+0x230/0x230 [ 891.105353] ? do_syscall_64+0x53/0x640 [ 891.311996] ? SyS_read+0x230/0x230 [ 891.315630] do_syscall_64+0x1e8/0x640 [ 891.319503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.324354] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 891.329563] RIP: 0033:0x45a919 [ 891.332744] RSP: 002b:00007fb77941fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 891.340455] RAX: ffffffffffffffda RBX: 00007fb77941fc90 RCX: 000000000045a919 [ 891.347751] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 891.355017] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 891.362294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7794206d4 14:15:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0xc5b7804c0bbd2a3a}, 0x10) r4 = socket$packet(0x11, 0x75f63a300163831f, 0x300) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000180)={0x40, 0x9, 0x3, 0x0, 0x0, [{{r2}, 0x8}, {{r3}, 0x7}, {{r4}, 0x3f}]}) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SIOCRSSL2CALL(r5, 0x89e2, &(0x7f0000000100)=@null) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:04 executing program 4 (fault-call:8 fault-nth:3): perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) [ 891.369560] R13: 00000000004c7c83 R14: 00000000004e4e40 R15: 0000000000000005 [ 891.377200] protocol 88fb is buggy, dev hsr_slave_0 [ 891.383295] protocol 88fb is buggy, dev hsr_slave_1 [ 891.388399] protocol 88fb is buggy, dev hsr_slave_0 [ 891.393519] protocol 88fb is buggy, dev hsr_slave_1 14:15:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000180)={0x2, 0x5, 0x4, 0x1000, 0x7, {0x77359400}, {0x1, 0xc, 0x0, 0x7, 0xcc, 0x1, "c63fe076"}, 0xffffffff, 0x55634384e24e31af, @fd, 0x800, 0x0, r0}) getpeername$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r4, 0x37, &(0x7f0000000580)={'ip_vti0\x00', @ifru_addrs=@nl=@unspec}) r5 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) timer_create(0x9, &(0x7f00000004c0)={0x0, 0x2b, 0x1, @thr={&(0x7f0000000200)="18007518d6ff77443ee062d93f3ed1efb23dbd54", &(0x7f0000000440)="d5b9929d35e67ccdbccef7698c50c612104948d5094b1afee70c8bf6353477854b22830815780ea6b43eec415a8e578ea9fb17d5175c346f5fb03365d1371c27b679db3378bec70b1de3944c0a39ba15ac48a9101eff6da4c770266053d5b47d962c45ebdcf49d758a457ee22902f446ab"}}, &(0x7f0000000500)=0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000540)=0x20000) timer_getoverrun(r7) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:04 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 891.520458] FAULT_INJECTION: forcing a failure. [ 891.520458] name failslab, interval 1, probability 0, space 0, times 0 [ 891.532093] CPU: 1 PID: 10002 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 891.532101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.532105] Call Trace: [ 891.532123] dump_stack+0x142/0x197 [ 891.532142] should_fail.cold+0x10f/0x159 [ 891.532156] ? radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 891.532174] should_failslab+0xdb/0x130 [ 891.532185] kmem_cache_alloc+0x47/0x780 [ 891.532201] ? save_stack+0x45/0xd0 [ 891.532210] ? kasan_kmalloc+0xce/0xf0 [ 891.532220] ? kasan_slab_alloc+0xf/0x20 [ 891.532229] ? kmem_cache_alloc+0x12e/0x780 [ 891.532241] ? __kernfs_new_node+0x70/0x480 [ 891.532250] ? kernfs_new_node+0x80/0xf0 [ 891.532260] ? kernfs_create_dir_ns+0x41/0x140 [ 891.532276] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 891.532292] idr_get_free_cmn+0x5a4/0x8e0 [ 891.532310] idr_alloc_cmn+0x10e/0x210 [ 891.532323] ? __fprop_inc_percpu_max+0x1e0/0x1e0 [ 891.532337] ? __lock_is_held+0xb6/0x140 [ 891.532347] ? check_preemption_disabled+0x3c/0x250 [ 891.532361] idr_alloc_cyclic+0xd0/0x1e2 [ 891.532375] ? ida_simple_remove+0x60/0x60 [ 891.532391] __kernfs_new_node+0xb0/0x480 [ 891.532405] kernfs_new_node+0x80/0xf0 [ 891.532418] kernfs_create_dir_ns+0x41/0x140 [ 891.532431] internal_create_group+0xea/0x7b0 [ 891.532450] sysfs_create_group+0x20/0x30 [ 891.532462] lo_ioctl+0x1176/0x1ce0 [ 891.532477] ? loop_probe+0x160/0x160 [ 891.532489] blkdev_ioctl+0x96b/0x1860 [ 891.532499] ? blkpg_ioctl+0x980/0x980 [ 891.532515] ? __might_sleep+0x93/0xb0 [ 891.532525] ? __fget+0x210/0x370 [ 891.532540] block_ioctl+0xde/0x120 [ 891.532551] ? blkdev_fallocate+0x3b0/0x3b0 [ 891.532562] do_vfs_ioctl+0x7ae/0x1060 [ 891.532574] ? selinux_file_mprotect+0x5d0/0x5d0 [ 891.532583] ? lock_downgrade+0x740/0x740 [ 891.532595] ? ioctl_preallocate+0x1c0/0x1c0 [ 891.532608] ? __fget+0x237/0x370 [ 891.532625] ? security_file_ioctl+0x89/0xb0 [ 891.532639] SyS_ioctl+0x8f/0xc0 [ 891.532649] ? do_vfs_ioctl+0x1060/0x1060 [ 891.532661] do_syscall_64+0x1e8/0x640 [ 891.532671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.532688] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 891.532696] RIP: 0033:0x45a787 [ 891.532701] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 891.532715] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 891.532722] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 891.532729] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 891.532736] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 891.532743] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 891.533129] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 891.533161] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 891.534839] JFS: discard option not supported on device [ 891.534845] JFS: discard option not supported on device [ 891.534861] jfs: Unrecognized mount option "d" or missing value [ 891.559662] FAULT_INJECTION: forcing a failure. [ 891.559662] name failslab, interval 1, probability 0, space 0, times 0 [ 891.563870] kobject: '0:43' (ffff888058a9d190): kobject_add_internal: parent: 'bdi', set: 'devices' [ 891.565932] CPU: 1 PID: 10007 Comm: syz-executor.4 Not tainted 4.14.160-syzkaller #0 [ 891.565938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.565945] Call Trace: [ 891.572218] kobject: '0:43' (ffff888058a9d190): kobject_uevent_env [ 891.575723] dump_stack+0x142/0x197 [ 891.575737] should_fail.cold+0x10f/0x159 [ 891.579874] kobject: '0:43' (ffff888058a9d190): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 891.583398] should_failslab+0xdb/0x130 [ 891.583405] __kmalloc+0x71/0x7a0 [ 891.583415] ? __mutex_lock+0x36a/0x1470 [ 891.583423] ? add_wait_queue+0x112/0x170 [ 891.583432] ? __tty_buffer_request_room+0x1a4/0x500 [ 891.583443] __tty_buffer_request_room+0x1a4/0x500 [ 891.618403] audit: type=1400 audit(1577110504.326:69): avc: denied { wake_alarm } for pid=9997 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 891.618510] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 891.941374] pty_write+0x113/0x1d0 [ 891.944907] ? pty_stop+0x1a0/0x1a0 [ 891.948522] n_tty_write+0x38b/0xf20 [ 891.952229] ? process_echoes+0x150/0x150 [ 891.956363] ? do_wait_intr_irq+0x2a0/0x2a0 [ 891.960831] ? _copy_from_user+0x99/0x110 [ 891.964970] tty_write+0x3f6/0x700 [ 891.968501] ? process_echoes+0x150/0x150 [ 891.972640] __vfs_write+0x105/0x6b0 [ 891.976342] ? tty_read+0x270/0x270 [ 891.979960] ? kernel_read+0x120/0x120 [ 891.983939] ? __inode_security_revalidate+0xd6/0x130 [ 891.989128] ? avc_policy_seqno+0x9/0x20 [ 891.993181] ? selinux_file_permission+0x85/0x480 [ 891.998015] ? security_file_permission+0x89/0x1f0 [ 892.002935] ? rw_verify_area+0xea/0x2b0 [ 892.006994] vfs_write+0x198/0x500 [ 892.010538] SyS_write+0xfd/0x230 [ 892.013972] ? SyS_read+0x230/0x230 [ 892.017582] ? do_syscall_64+0x53/0x640 [ 892.021542] ? SyS_read+0x230/0x230 [ 892.025153] do_syscall_64+0x1e8/0x640 [ 892.029031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.033873] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.039047] RIP: 0033:0x45a919 [ 892.042218] RSP: 002b:00007fb77941fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 892.049909] RAX: ffffffffffffffda RBX: 00007fb77941fc90 RCX: 000000000045a919 [ 892.057256] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 [ 892.064523] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 892.071975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7794206d4 [ 892.079404] R13: 00000000004c7c83 R14: 00000000004e4e40 R15: 0000000000000005 [ 892.087023] [ 892.087026] ====================================================== [ 892.087028] WARNING: possible circular locking dependency detected [ 892.087029] 4.14.160-syzkaller #0 Not tainted [ 892.087031] ------------------------------------------------------ [ 892.087032] syz-executor.4/10007 is trying to acquire lock: [ 892.087033] (console_owner){-.-.}, at: [] vprintk_emit+0x2f1/0x600 [ 892.087038] [ 892.087039] but task is already holding lock: [ 892.087040] (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xe0/0x1d0 [ 892.087044] [ 892.087046] which lock already depends on the new lock. [ 892.087046] [ 892.087047] [ 892.087049] the existing dependency chain (in reverse order) is: [ 892.087049] [ 892.087050] -> #2 (&(&port->lock)->rlock){-.-.}: [ 892.087055] lock_acquire+0x16f/0x430 [ 892.087056] _raw_spin_lock_irqsave+0x95/0xcd [ 892.087058] tty_port_tty_get+0x22/0x90 [ 892.087059] tty_port_default_wakeup+0x16/0x40 [ 892.087060] tty_port_tty_wakeup+0x57/0x70 [ 892.087062] uart_write_wakeup+0x46/0x70 [ 892.087063] serial8250_tx_chars+0x40d/0xa10 [ 892.087065] serial8250_handle_irq.part.0+0x206/0x250 [ 892.087066] serial8250_default_handle_irq+0xa1/0x120 [ 892.087068] serial8250_interrupt+0xe9/0x1a0 [ 892.087069] __handle_irq_event_percpu+0x125/0x7f0 [ 892.087071] handle_irq_event_percpu+0x65/0x130 [ 892.087072] handle_irq_event+0xa7/0x134 [ 892.087073] handle_edge_irq+0x22b/0x840 [ 892.087074] handle_irq+0x39/0x50 [ 892.087075] do_IRQ+0x99/0x1d0 [ 892.087077] ret_from_intr+0x0/0x1e [ 892.087078] _raw_spin_unlock_irqrestore+0x95/0xe0 [ 892.087079] uart_write+0x29a/0x4f0 [ 892.087081] n_tty_write+0x38b/0xf20 [ 892.087082] tty_write+0x3f6/0x700 [ 892.087083] redirected_tty_write+0xa3/0xb0 [ 892.087084] __vfs_write+0x105/0x6b0 [ 892.087086] vfs_write+0x198/0x500 [ 892.087087] SyS_write+0xfd/0x230 [ 892.087088] do_syscall_64+0x1e8/0x640 [ 892.087089] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.087090] [ 892.087091] -> #1 (&port_lock_key){-.-.}: [ 892.087096] lock_acquire+0x16f/0x430 [ 892.087097] _raw_spin_lock_irqsave+0x95/0xcd [ 892.087099] serial8250_console_write+0x709/0x930 [ 892.087100] univ8250_console_write+0x5f/0x70 [ 892.087101] console_unlock+0x9ba/0xed0 [ 892.087102] vprintk_emit+0x1f9/0x600 [ 892.087104] vprintk_default+0x28/0x30 [ 892.087105] vprintk_func+0x5d/0x159 [ 892.087106] printk+0x9e/0xbc [ 892.087107] register_console+0x614/0x9e0 [ 892.087109] univ8250_console_init+0x33/0x3f [ 892.087110] console_init+0x4d/0x5d [ 892.087112] start_kernel+0x43c/0x6fd [ 892.087113] x86_64_start_reservations+0x29/0x2b [ 892.087114] x86_64_start_kernel+0x77/0x7b [ 892.087116] secondary_startup_64+0xa5/0xb0 [ 892.087117] [ 892.087117] -> #0 (console_owner){-.-.}: [ 892.087122] __lock_acquire+0x2cb3/0x4620 [ 892.087123] lock_acquire+0x16f/0x430 [ 892.087124] vprintk_emit+0x32e/0x600 [ 892.087126] vprintk_default+0x28/0x30 [ 892.087127] vprintk_func+0x5d/0x159 [ 892.087128] printk+0x9e/0xbc [ 892.087129] should_fail.cold+0xe4/0x159 [ 892.087131] should_failslab+0xdb/0x130 [ 892.087132] __kmalloc+0x71/0x7a0 [ 892.087133] __tty_buffer_request_room+0x1a4/0x500 [ 892.087135] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 892.087136] pty_write+0x113/0x1d0 [ 892.087138] n_tty_write+0x38b/0xf20 [ 892.087139] tty_write+0x3f6/0x700 [ 892.087140] __vfs_write+0x105/0x6b0 [ 892.087141] vfs_write+0x198/0x500 [ 892.087142] SyS_write+0xfd/0x230 [ 892.087144] do_syscall_64+0x1e8/0x640 [ 892.087145] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.087146] [ 892.087147] other info that might help us debug this: [ 892.087148] [ 892.087149] Chain exists of: [ 892.087150] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 892.087155] [ 892.087156] Possible unsafe locking scenario: [ 892.087157] [ 892.087158] CPU0 CPU1 [ 892.087160] ---- ---- [ 892.087160] lock(&(&port->lock)->rlock); [ 892.087163] lock(&port_lock_key); [ 892.087166] lock(&(&port->lock)->rlock); [ 892.087169] lock(console_owner); [ 892.087171] [ 892.087172] *** DEADLOCK *** [ 892.087173] [ 892.087174] 5 locks held by syz-executor.4/10007: [ 892.087175] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 892.087180] #1: (&tty->atomic_write_lock){+.+.}, at: [] tty_write_lock+0x20/0x60 [ 892.087184] #2: (&o_tty->termios_rwsem/1){++++}, at: [] n_tty_write+0x179/0xf20 [ 892.087190] #3: (&ldata->output_lock){+.+.}, at: [] n_tty_write+0x48a/0xf20 [ 892.087194] #4: (&(&port->lock)->rlock){-.-.}, at: [] pty_write+0xe0/0x1d0 [ 892.087198] [ 892.087200] stack backtrace: [ 892.087202] CPU: 1 PID: 10007 Comm: syz-executor.4 Not tainted 4.14.160-syzkaller #0 [ 892.087204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.087205] Call Trace: [ 892.087206] dump_stack+0x142/0x197 [ 892.087208] ? vprintk_func+0x65/0x159 [ 892.087209] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 892.087210] __lock_acquire+0x2cb3/0x4620 [ 892.087212] ? trace_hardirqs_on+0x10/0x10 [ 892.087213] ? save_trace+0x290/0x290 [ 892.087214] ? vprintk_emit+0x309/0x600 [ 892.087215] lock_acquire+0x16f/0x430 [ 892.087216] ? vprintk_emit+0x2f1/0x600 [ 892.087218] vprintk_emit+0x32e/0x600 [ 892.087219] ? vprintk_emit+0x2f1/0x600 [ 892.087220] vprintk_default+0x28/0x30 [ 892.087221] vprintk_func+0x5d/0x159 [ 892.087222] ? save_trace+0x290/0x290 [ 892.087223] printk+0x9e/0xbc [ 892.087225] ? show_regs_print_info+0x63/0x63 [ 892.087226] ? ___ratelimit+0x55/0x537 [ 892.087227] should_fail.cold+0xe4/0x159 [ 892.087229] should_failslab+0xdb/0x130 [ 892.087230] __kmalloc+0x71/0x7a0 [ 892.087231] ? __mutex_lock+0x36a/0x1470 [ 892.087232] ? add_wait_queue+0x112/0x170 [ 892.087234] ? __tty_buffer_request_room+0x1a4/0x500 [ 892.087235] __tty_buffer_request_room+0x1a4/0x500 [ 892.087237] tty_insert_flip_string_fixed_flag+0x8a/0x1c0 [ 892.087238] pty_write+0x113/0x1d0 [ 892.087239] ? pty_stop+0x1a0/0x1a0 [ 892.087240] n_tty_write+0x38b/0xf20 [ 892.087242] ? process_echoes+0x150/0x150 [ 892.087243] ? do_wait_intr_irq+0x2a0/0x2a0 [ 892.087244] ? _copy_from_user+0x99/0x110 [ 892.087245] tty_write+0x3f6/0x700 [ 892.087247] ? process_echoes+0x150/0x150 [ 892.087248] __vfs_write+0x105/0x6b0 [ 892.087249] ? tty_read+0x270/0x270 [ 892.087250] ? kernel_read+0x120/0x120 [ 892.087252] ? __inode_security_revalidate+0xd6/0x130 [ 892.087253] ? avc_policy_seqno+0x9/0x20 [ 892.087254] ? selinux_file_permission+0x85/0x480 [ 892.087256] ? security_file_permission+0x89/0x1f0 [ 892.087257] ? rw_verify_area+0xea/0x2b0 [ 892.087258] vfs_write+0x198/0x500 [ 892.087259] SyS_write+0xfd/0x230 [ 892.087261] ? SyS_read+0x230/0x230 [ 892.087262] ? do_syscall_64+0x53/0x640 [ 892.087263] ? SyS_read+0x230/0x230 [ 892.087264] do_syscall_64+0x1e8/0x640 [ 892.087265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.087267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.087268] RIP: 0033:0x45a919 [ 892.087269] RSP: 002b:00007fb77941fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 892.087273] RAX: ffffffffffffffda RBX: 00007fb77941fc90 RCX: 000000000045a919 [ 892.087275] RDX: 00000000ffffff0b RSI: 0000000020c34fff RDI: 0000000000000003 14:15:05 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) [ 892.087276] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 892.087278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7794206d4 [ 892.087280] R13: 00000000004c7c83 R14: 00000000004e4e40 R15: 0000000000000005 [ 892.845599] kobject: 'loop3' (ffff8880a412e520): kobject_uevent_env [ 892.853209] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 892.858061] kobject: 'loop3' (ffff8880a412e520): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:15:05 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$selinux_create(r2, &(0x7f0000001380)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7761746368646f675f6465766963655f743a7330207b797374656d5f753a73797374756d5f723a6b65726e656c5f743a73302030303030303030303030303030303030303030310098ac3577714307e07c8cda200edf437c8b1a9a8cdf948296376f090de97cc54e06fe5f5e3d8c9069b1cfa15d5cbe2d0f09643f649119b25b8981a7778b45b0a3bdfd34fc3588aceb710f1e8eda2a53375bcda285abb0e43d7d08fb8d8aa00266ecf2477aaad755b1264820db535233cf791e371858d79b1f662e0bdfbfd3743dfbe3e7bd69b13327825659c9710fda15aecec20a59"], 0x5a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f0000000080)=0x4) read$FUSE(r3, &(0x7f0000000380), 0x313) sendfile(r0, r1, 0x0, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r5, 0x1000000) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) sendfile(r4, r6, 0x0, 0xeefffdef) [ 892.859646] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:15:05 executing program 4 (fault-call:8 fault-nth:4): perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:15:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) [ 892.919616] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 892.941335] kobject: '0:43' (ffff888058a9d190): kobject_uevent_env [ 892.948223] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 892.948916] kobject: '0:43' (ffff888058a9d190): fill_kobj_path: path = '/devices/virtual/bdi/0:43' 14:15:05 executing program 0: mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40, 0x6) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 892.968525] FAULT_INJECTION: forcing a failure. [ 892.968525] name failslab, interval 1, probability 0, space 0, times 0 [ 892.982890] CPU: 0 PID: 10027 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 892.990357] kobject: '0:43' (ffff888058a9d190): kobject_cleanup, parent (null) [ 892.990802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.990806] Call Trace: [ 892.990822] dump_stack+0x142/0x197 [ 892.990836] should_fail.cold+0x10f/0x159 [ 893.001232] kobject: '0:43' (ffff888058a9d190): calling ktype release [ 893.008463] should_failslab+0xdb/0x130 [ 893.008473] kmem_cache_alloc+0x2d7/0x780 [ 893.008483] ? wait_for_completion+0x420/0x420 [ 893.008489] ? ida_simple_remove+0x60/0x60 [ 893.008502] __kernfs_new_node+0x70/0x480 [ 893.011266] kobject: '0:43': free name [ 893.014723] ? kernfs_activate+0x13a/0x190 [ 893.014734] kernfs_new_node+0x80/0xf0 [ 893.014744] __kernfs_create_file+0x46/0x323 [ 893.014753] sysfs_add_file_mode_ns+0x1e4/0x450 14:15:05 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getpeername$ax25(r2, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r3, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap$snddsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10, r4, 0x2000) [ 893.014765] internal_create_group+0x232/0x7b0 [ 893.020768] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 893.025503] sysfs_create_group+0x20/0x30 [ 893.025513] lo_ioctl+0x1176/0x1ce0 [ 893.025521] ? loop_probe+0x160/0x160 [ 893.025529] blkdev_ioctl+0x96b/0x1860 [ 893.025537] ? blkpg_ioctl+0x980/0x980 [ 893.025548] ? __might_sleep+0x93/0xb0 [ 893.025558] block_ioctl+0xde/0x120 [ 893.025565] ? blkdev_fallocate+0x3b0/0x3b0 [ 893.025574] do_vfs_ioctl+0x7ae/0x1060 [ 893.025585] ? selinux_file_mprotect+0x5d0/0x5d0 [ 893.025592] ? lock_downgrade+0x740/0x740 [ 893.025600] ? ioctl_preallocate+0x1c0/0x1c0 [ 893.025609] ? __fget+0x237/0x370 [ 893.025625] ? security_file_ioctl+0x89/0xb0 [ 893.025634] SyS_ioctl+0x8f/0xc0 [ 893.025644] ? do_vfs_ioctl+0x1060/0x1060 [ 893.029747] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 893.033744] do_syscall_64+0x1e8/0x640 [ 893.033753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.033766] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 893.033773] RIP: 0033:0x45a787 14:15:05 executing program 0: ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000080)={0x3, 0x7, 0x3}) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000100)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x0) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x5, 0x0, [{0xafe, 0x0, 0x2}, {0x206, 0x0, 0x7ff}, {0xbd6, 0x0, 0x8}, {0xc0000101, 0x0, 0x8768}, {0x1b1, 0x0, 0x40}]}) [ 893.033777] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 893.033788] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 893.085979] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 893.086573] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 893.091802] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 893.094269] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 14:15:05 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f0000000380)=0xffffff0d) futimesat(r1, &(0x7f0000000300)='.\x00', &(0x7f0000000340)={{0x0, 0x2710}, {0x77359400}}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x400) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) mq_timedreceive(r3, &(0x7f0000000140)=""/28, 0x1c, 0xa29, &(0x7f0000000180)) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x400, 0x0) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000100)={0x9, 0x7fffffff}) r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, &(0x7f00000001c0)=0x4) dup3(r2, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) [ 893.094275] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 893.094280] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 893.100706] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 893.188466] audit: type=1400 audit(1577110505.896:70): avc: denied { map } for pid=10039 comm="syz-executor.4" path="/selinux/avc/hash_stats" dev="selinuxfs" ino=26 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 14:15:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xffffffffffffffdf, 0x0, 0x0, 0xffffffffffffff6b) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:06 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x24, 0x3, 0x3}}, 0x14) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) close(r1) r2 = syz_open_pts(r1, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) [ 893.191417] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 893.248657] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 893.263020] JFS: discard option not supported on device [ 893.284253] JFS: discard option not supported on device [ 893.288423] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 893.295722] jfs: Unrecognized mount option "d" or missing value 14:15:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) r4 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r2, &(0x7f0000000480)="d84d1f82727fc87f9eec1de35378fd4b68fd3eef0d187daf17e92faa8ef5bc145b37319d24d48691d099598b586e213f768a5d261980b6f03f34bc6697a1f38e721cbddd5ec804d8e45a0a7f07e61f3c5dfc25223caafc3216ef09460b5eaf1772aa87f8db5755e8a18bcb7a8fcaad3b10a60c5c5bc41e3f37720c0369d1a6b3c29b2a647ad13f36db7e9276f6322a71547f9fe311c18ece4346751c4aae4fc340f8f53ee17f5b0bffe0bff6df2c7ecdcc9b153124d67bdf550d8ea139390855afa9dd9cd519ae55ae1a4d928a5d94e90462898104028a8eca", 0xd9, 0x7, 0x0, 0x1, r3}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x197, r4, &(0x7f0000000300)="2f33b9a9d1a292d16f10fa1dfe7dc9ba50eb039805d81010996679ed151ac74acd76d0fa059775fc5c26ac004cbc639f8cf98024dc54c01e728f5cfa083c0e49059126ebec348cd13c7678d62e85e8357f5d285b860f59749abf309b0429987da0e6fdc99cd48e26438618445c8db7b00bfb6b2b47cd0d657871fcc5995819a02cb11aab3cf552e0eb17933c778098e04890751933df7b973a3e3cd27ea5447c58c1e5c2a81157b8", 0xa8, 0x2, 0x0, 0x2, r5}]) [ 893.347554] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 893.357564] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 893.360459] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 893.376998] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 893.385761] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 893.392635] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 893.421123] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 893.427750] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 893.487533] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 893.494145] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:15:06 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:15:06 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 893.685688] kobject: 'loop3' (ffff8880a412e520): kobject_uevent_env [ 893.689491] FAULT_INJECTION: forcing a failure. [ 893.689491] name failslab, interval 1, probability 0, space 0, times 0 [ 893.694184] kobject: 'loop3' (ffff8880a412e520): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 893.703485] CPU: 0 PID: 10071 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 893.720757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.730113] Call Trace: [ 893.732717] dump_stack+0x142/0x197 [ 893.736366] should_fail.cold+0x10f/0x159 [ 893.740524] should_failslab+0xdb/0x130 [ 893.744498] kmem_cache_alloc+0x2d7/0x780 [ 893.748857] ? wait_for_completion+0x420/0x420 [ 893.753427] ? ida_simple_remove+0x60/0x60 [ 893.757651] __kernfs_new_node+0x70/0x480 [ 893.761841] ? kernfs_activate+0x13a/0x190 [ 893.766061] kernfs_new_node+0x80/0xf0 [ 893.769931] __kernfs_create_file+0x46/0x323 [ 893.774341] sysfs_add_file_mode_ns+0x1e4/0x450 [ 893.779063] internal_create_group+0x232/0x7b0 14:15:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x4000000) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x2200, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) sendmmsg$inet6(r2, &(0x7f0000002600)=[{{&(0x7f0000000200)={0xa, 0x4e21, 0x9, @ipv4={[], [], @multicast1}}, 0x1c, &(0x7f0000000280), 0x0, &(0x7f0000000500)=[@hopopts={{0x28, 0x29, 0x36, {0x5e, 0x2, [], [@enc_lim={0x4, 0x1, 0xf1}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @ra={0x5, 0x2, 0x9}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @hopopts={{0x70, 0x29, 0x36, {0x0, 0xa, [], [@calipso={0x7, 0x40, {0x6, 0xe, 0x3, 0x9, [0x80000001, 0xffff, 0x8, 0xc6e3, 0xffff, 0xfff, 0xa4e]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x400}, @enc_lim={0x4, 0x1, 0xfd}, @ra={0x5, 0x2, 0xf84}]}}}], 0xb0}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty, 0xd515}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000340)}, {&(0x7f0000000400)="91e68e343f0f451270a711c3b4df8201cf", 0x11}], 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="68000000000000002900000039000000130a02fb00000000fe88000000000000ffffffe5000001018e4881cc91cbe8d18afba0440b1a8264fe88000000000000000000000000000100000000000000000000000000000000fe880000000000000000000000000001"], 0x68}}, {{&(0x7f0000000680)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x471daff8}, 0x1c, &(0x7f00000006c0)=[{&(0x7f0000000d80)="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", 0x1000}, {&(0x7f0000000740)}, {&(0x7f0000000840)="6a450ae7929013d2a8ec72a23e9751a82b0565ae7288065ddec49ea252bd384c9e26c1f12dc0cd9709691bf6c087602330c4cdd47b7690f399a92f6dcf46ca3a0364f79ab267ccff85e7b709d5fa081835e9834969ede28b4929d4f8c153214d992edbbbf1f3077ff792d1f2afde70199c8a28d9c3b85e9188dd9494902ba1fd20487acd0c0b38d5af84804a39b0d7d2b54e439dd2b17d0460dcbf63b35c5c629ee2477d402770f9b727294578bec05eab9d31c4f9", 0xb5}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/463, @ANYRES32=r3, @ANYBLOB], 0x1d3}}, {{&(0x7f0000000d00)={0xa, 0x4e20, 0x0, @remote, 0xefdd}, 0x1c, &(0x7f0000001f40)=[{&(0x7f0000001d80)}, {0x0}, {&(0x7f0000001e80)="95625d6469be24556962472f7ce3b4b4b5ba763e3c6e1aa3598bf4e47182226d9b20fafb", 0x24}, {&(0x7f0000001ec0)="b9c71c3a0ea94bef2f823d9fba571b98a1bdbcc6c66ae89f424fe5930fc447210132141403973da6bd588c17a5cf0ec42553a3987488a4d181764ea2", 0x3c}], 0x4}}, {{&(0x7f0000001f80)={0xa, 0x4e24, 0x9, @empty}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000001fc0)="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", 0xff}, {&(0x7f0000002140)="a2e5917bc44da94b877617b83143cbc459f8682c07c0a2f04754fbc484e9f3cca6a669e7566a736d4ae2ee6c5aa011fb132bcc4c3e01d8128b91a95f2226db2e504e59947639c2a3ce9a23e9f747ecc6ae6b638fc24c9a5f0a01a54970978252f83b7da5d4e1797cb01b2fe1a881a9ed1a178927dd73c57077ca97ecb6035c5afceb7ccf72f56dbd4679d41f791727d126e972d63312b94d369b479cc86ee9ea02f75dbdb7", 0xa5}, {&(0x7f0000002200)="fcbe725b50f65d8d221f46273250e582805e53680f257beeca3e212a05546030339136660dd901bedbca1f545d736dee45a2791441495fd557eadc08e99e544d23f2805ca9d853e4ac99b0d23ca619b4aaa10a91c6a57cd2fdce6ea31eedbcd9d51f765f60a74f76e89dd0880197", 0x6e}, {0x0}, {&(0x7f0000002380)="45db0f5ce8fb4319412fd49d64f1c19ee85a3eb8af73f66ffad07199", 0x1c}], 0x5, &(0x7f0000002580)=[@hopopts={{0x40, 0x29, 0x36, {0xa0, 0x4, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x81, 0x0}}, @hao={0xc9, 0x10, @loopback}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x12}}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}], 0x80}}], 0x5, 0x40000) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_delroute={0x38, 0x19, 0x200, 0x70bd26, 0x25dfdbfd, {0x2, 0x54, 0x10, 0x4, 0x0, 0x1, 0xff, 0x8, 0x300}, [@RTA_MULTIPATH={0xc, 0x9, {0x3, 0x5, 0x92, r3}}, @RTA_GATEWAY={0x8, 0x5, @loopback}, @RTA_UID={0x8, 0x19, r5}]}, 0x10a}, 0x1, 0x0, 0x0, 0x4020}, 0x20000c1) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) r6 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) getpeername$ax25(r6, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet6_int(r6, 0x29, 0x8, &(0x7f0000000000)=0xffffffff, 0xaa) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) [ 893.783647] sysfs_create_group+0x20/0x30 [ 893.787892] lo_ioctl+0x1176/0x1ce0 [ 893.791521] ? loop_probe+0x160/0x160 [ 893.795328] blkdev_ioctl+0x96b/0x1860 [ 893.799217] ? blkpg_ioctl+0x980/0x980 [ 893.803108] ? __might_sleep+0x93/0xb0 [ 893.806998] block_ioctl+0xde/0x120 [ 893.810717] ? blkdev_fallocate+0x3b0/0x3b0 [ 893.815046] do_vfs_ioctl+0x7ae/0x1060 [ 893.818939] ? selinux_file_mprotect+0x5d0/0x5d0 [ 893.823705] ? lock_downgrade+0x740/0x740 [ 893.827865] ? ioctl_preallocate+0x1c0/0x1c0 [ 893.832285] ? __fget+0x237/0x370 14:15:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = socket$netlink(0x10, 0x3, 0x12) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x310}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d218121b", @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80000}, 0x20) sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x40082) r5 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) r7 = dup2(r6, r5) execveat(r7, &(0x7f0000000000)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000040)='\x00', &(0x7f0000000080)='em1bdevcpusetselfbdev\x00', &(0x7f00000000c0)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1bQN*\x9e\x95v\xd8\x1c\x8d;\xbbd\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\xf5\x91\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xf2\x8dF~[F\xea\xae\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15', &(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', &(0x7f0000000300)='vmnet0,\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='wlan1^mime_type\x00', &(0x7f00000004c0)='/dev/vbi#\x00', &(0x7f0000000500)='/dev/vbi#\x00'], &(0x7f0000000840)=[&(0x7f00000005c0)='\x00', &(0x7f0000000600)='vmnet1+$selfwlan0em1em1\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='/dev/vbi#\x00', &(0x7f00000006c0)='/dev/vbi#\x00', &(0x7f0000000700)='.proclomime_type)#lo\x00', &(0x7f0000000740)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'], 0x800) ftruncate(r5, 0x1000000) sendfile(r2, r5, 0x0, 0xeefffdef) [ 893.835750] ? security_file_ioctl+0x89/0xb0 [ 893.840172] SyS_ioctl+0x8f/0xc0 [ 893.843549] ? do_vfs_ioctl+0x1060/0x1060 [ 893.847707] do_syscall_64+0x1e8/0x640 [ 893.851601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.856450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 893.861649] RIP: 0033:0x45a787 [ 893.864852] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 893.872581] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 893.872590] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 893.887137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 893.894424] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 893.902000] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 893.903410] audit: type=1400 audit(1577110506.616:71): avc: denied { create } for pid=10083 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 14:15:06 executing program 0: r0 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r0, 0x1, 0xf, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000280)=""/246) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) sendfile(r2, r3, &(0x7f0000000000)=0x20, 0x6) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x4ecd]) connect$inet6(r1, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) socket$inet6(0xa, 0xa, 0x3) recvfrom$inet6(r1, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000040)=0x2000, 0xffffffffffffffa5) sendto$inet6(r1, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 893.914371] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 893.941271] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 893.953044] JFS: discard option not supported on device [ 893.960721] JFS: discard option not supported on device [ 893.969376] jfs: Unrecognized mount option "d" or missing value 14:15:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x208100) 14:15:06 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 893.990460] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 893.997065] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 894.020515] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 894.026957] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 894.055444] FAULT_INJECTION: forcing a failure. [ 894.055444] name failslab, interval 1, probability 0, space 0, times 0 [ 894.067203] CPU: 1 PID: 10108 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 894.075321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.084805] Call Trace: [ 894.087390] dump_stack+0x142/0x197 [ 894.091011] should_fail.cold+0x10f/0x159 [ 894.095150] should_failslab+0xdb/0x130 [ 894.099109] kmem_cache_alloc+0x2d7/0x780 [ 894.103251] ? wait_for_completion+0x420/0x420 [ 894.107817] ? ida_simple_remove+0x60/0x60 [ 894.112219] __kernfs_new_node+0x70/0x480 [ 894.116351] ? kernfs_activate+0x13a/0x190 [ 894.120573] kernfs_new_node+0x80/0xf0 [ 894.124457] __kernfs_create_file+0x46/0x323 [ 894.128875] sysfs_add_file_mode_ns+0x1e4/0x450 [ 894.134783] internal_create_group+0x232/0x7b0 [ 894.139351] sysfs_create_group+0x20/0x30 [ 894.143514] lo_ioctl+0x1176/0x1ce0 [ 894.147214] ? loop_probe+0x160/0x160 [ 894.150998] blkdev_ioctl+0x96b/0x1860 [ 894.154877] ? blkpg_ioctl+0x980/0x980 [ 894.158755] ? __might_sleep+0x93/0xb0 [ 894.162641] ? do_raw_spin_unlock+0x16b/0x260 [ 894.167177] block_ioctl+0xde/0x120 [ 894.170798] ? blkdev_fallocate+0x3b0/0x3b0 [ 894.175108] do_vfs_ioctl+0x7ae/0x1060 [ 894.178991] ? selinux_file_mprotect+0x5d0/0x5d0 [ 894.183735] ? lock_downgrade+0x740/0x740 [ 894.187884] ? ioctl_preallocate+0x1c0/0x1c0 [ 894.192279] ? __fget+0x237/0x370 [ 894.195726] ? security_file_ioctl+0x89/0xb0 [ 894.200127] SyS_ioctl+0x8f/0xc0 14:15:06 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x20, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8004000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r3, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x17}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x78}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r4 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r4, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000040)={0x4, 0xfffffffb, 0x3, 0x2, 0x1}, 0x14) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) [ 894.203479] ? do_vfs_ioctl+0x1060/0x1060 [ 894.207639] do_syscall_64+0x1e8/0x640 [ 894.211519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.216360] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 894.221554] RIP: 0033:0x45a787 [ 894.224743] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 894.232460] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 894.239735] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 894.244220] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env 14:15:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000280)={r2, 0x0, 0xfffc, "5c27539704f571c88360338d7fd249545da0aa6773915a5f4661a5ee300fd1875b00410800761aee1daffd3b5288721bb450815451b72f749d422a13f7422650a002bee27bdc8b83394284ef0d5ba0df6d96bbcdfc2083b9f5fa8244850865e1b0e094a9d7cd3f818c41820adbb49f6f46c93c0149d6bc182ff1b34a0d588d7b270a43d1a4031ac38f04cd86f8e084b9115ad9bbddf4713a99b17158e789a50523f6b35afb6fc2c701175ca6eeaed04802b838c869167530672d7610f3cd6615ebcb47e0af8a5b14e99111a24ad739174da12a2aad05e0ab00b397b55add91edf68ab4c6"}) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:07 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[0x9, 0x80000000, 0x9, 0x9, 0x6, 0x8, 0x4, 0x26, 0x3, 0x1000, 0x8000, 0x1dd4, 0xfff, 0x5, 0x0, 0xffffffff], 0x0, 0x400}) 14:15:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) [ 894.247002] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 894.247008] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 894.247012] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 894.248896] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 894.256053] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 894.262003] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 894.319131] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 894.325952] JFS: discard option not supported on device [ 894.326085] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 894.334653] JFS: discard option not supported on device [ 894.348762] jfs: Unrecognized mount option "d" or missing value [ 894.391318] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 894.398560] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:15:07 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:15:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) rt_sigreturn() sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:07 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) [ 894.456510] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 894.463457] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 894.480522] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 894.488973] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 894.514996] kobject: 'loop3' (ffff8880a412e520): kobject_uevent_env [ 894.523891] kobject: 'loop3' (ffff8880a412e520): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 894.527407] FAULT_INJECTION: forcing a failure. [ 894.527407] name failslab, interval 1, probability 0, space 0, times 0 [ 894.546134] CPU: 0 PID: 10142 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 894.554038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.563396] Call Trace: [ 894.565997] dump_stack+0x142/0x197 [ 894.569765] should_fail.cold+0x10f/0x159 [ 894.573911] should_failslab+0xdb/0x130 [ 894.577918] kmem_cache_alloc+0x2d7/0x780 [ 894.582067] ? wait_for_completion+0x420/0x420 [ 894.586730] ? ida_simple_remove+0x60/0x60 [ 894.590956] __kernfs_new_node+0x70/0x480 [ 894.595157] ? kernfs_activate+0x13a/0x190 [ 894.599385] kernfs_new_node+0x80/0xf0 [ 894.603259] __kernfs_create_file+0x46/0x323 [ 894.607660] sysfs_add_file_mode_ns+0x1e4/0x450 [ 894.612426] internal_create_group+0x232/0x7b0 [ 894.616997] sysfs_create_group+0x20/0x30 [ 894.621136] lo_ioctl+0x1176/0x1ce0 [ 894.624770] ? loop_probe+0x160/0x160 [ 894.629183] blkdev_ioctl+0x96b/0x1860 [ 894.633081] ? blkpg_ioctl+0x980/0x980 [ 894.636969] ? __might_sleep+0x93/0xb0 [ 894.640864] block_ioctl+0xde/0x120 [ 894.644484] ? blkdev_fallocate+0x3b0/0x3b0 [ 894.648792] do_vfs_ioctl+0x7ae/0x1060 [ 894.652666] ? selinux_file_mprotect+0x5d0/0x5d0 [ 894.657493] ? lock_downgrade+0x740/0x740 [ 894.661643] ? ioctl_preallocate+0x1c0/0x1c0 [ 894.666056] ? __fget+0x237/0x370 [ 894.669515] ? security_file_ioctl+0x89/0xb0 [ 894.673935] SyS_ioctl+0x8f/0xc0 [ 894.677299] ? do_vfs_ioctl+0x1060/0x1060 [ 894.681455] do_syscall_64+0x1e8/0x640 [ 894.685348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.690187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 894.695370] RIP: 0033:0x45a787 [ 894.698541] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 894.706253] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 14:15:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r3, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) bind$rxrpc(r3, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @multicast1}}, 0x24) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r2, r4, 0x0, 0xeefffdef) 14:15:07 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x101000, 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000080)={0x2bd, 0x6}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000100)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x1}) 14:15:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003600)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x1ff, @local, 0x8}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000280)="82b55c747a23e4c5862e813900c2a717a297e95d656a0020b8527305fff93a12c15a1c92cf518983e4f5d97250bfe1ab348c6cbf24c07cc3834f436704fba013633c6de950a87f34809dafa7c5677445f8bb89e097e0cc5c13085cfa83130c53dbcff445504e463f5ff791f8301dfd93738f0e2e11dd300cdc48f712e01997d5039dd9a48c63af51f64ce01aac4b4e274feedb3474dbcab13da5efef5d6e643d93bd2724af904deeacdc4f9651be1ec8d34bee72c77ec79841606ea1672cf9367746f62ff362e64feddec03723a3cd6e", 0xd0}, {&(0x7f0000000080)="2421829d3be3d96b1813d66bc4d3c3b203710ab3239d9eb03ea91fc6c9e22cbed5ca468a8f3ac7b866c1ad9219dfdaf27a0bf1c462", 0x35}, {&(0x7f0000000180)="79352bf3a53bae0ca2bdcda1ba651f70929330315e227c0ddf09ceb0101a96aab5cc0198f5e02fa50f20122e6376d393e7375cdb8aeafd2b0b768d3e91dafb7b834c6023f3aa6831dfb2d409b2c1ff70f8fc23081fac6b4de440dd41714b44182e81de144e5bdb460e336dfe447ab2800414e46d7fe7c5463da2af1f5a1fd48a1d62811b56b87e7a6428c5a5344104a781fa1ae109f54b0e5eee6ad54cf5c3ad54d00e4ff8e76a8a66a53bd1d0f98790ef0697885bc9", 0xb6}], 0x3, &(0x7f0000000400)=[@hopopts={{0x40, 0x29, 0x36, {0x3c, 0x4, [], [@jumbo={0xc2, 0x4, 0x69}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @pad1]}}}], 0x40}}, {{&(0x7f0000000440)={0xa, 0x4e22, 0x20f9, @mcast2, 0x8000}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000480)="d8ff914b423405327301a02d951f7bad78d9f98f644d8ef582d505628bef9183cc1ed0e9b3ed4dbd813870bffc027f89bbe52541c8798f974420fef801dc6a9b8b403f38a2d46a47ae9fd00d287183103076f5ee82ab4ab8bf535d0b1a84805331a6a906ddac0397998fe0423970bba33aabb696c9b34f41fefac3be4a1727bcf0d6a8776e155fbcf1e2395424d1c4f590a20c54846bfe1f72a3aa623b8e1902947f922668ca0da7fa26d2f0", 0xac}], 0x1}}, {{&(0x7f0000000580)={0xa, 0x4e21, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c, &(0x7f0000001980)=[{&(0x7f00000005c0)="2bfbebd8", 0x4}, {&(0x7f0000000600)="ba034cc3da619a15b46439dae0c0d674a2d45dffb6016a90405c4c9504de2a82286c70b482bac07f827460dc46f3e2051861ceec19229e40a675ac4b80bd0ab2cdcab5610ecffc4b75e3ef20f0be58af75446fb3c69aae935ff198df060dd56febf86512dcd80fd9eb4e8ea9d7453a8343bae1bfaf37abfc31656d6dfe0d6c1af5d7e8678973e91e", 0x88}, {&(0x7f00000006c0)="51e7688d9d0e1bd807138550b073f96c", 0x10}, {&(0x7f0000000700)="9a7aa451ffae51d5cda1ed025d27c375d381ff5218906e741618c0b1d1054d868f288e2068b6cc3c5c2e9f7f7a9f385ffaf93db14c9f25e587ef3df63ee7c4051b9f175abb2642e9a991f28d0c4512646c82802b122e6d803f0e7c2abc050eeae248b330f5e3498f94a57a8313c03216eee3a81522204ef8c31b310a1cb85445e89c1ad71561a738fb85724a5298a462cc945774623361d78acfce7a5bca67ad981dd7e95a567c08", 0xa8}, {&(0x7f00000007c0)="013ec96d2b48012248ae041a0aec8b82b1eb0c6b01b1da15281a56720a8ce391061a4295ad6b90a3fa8c3074edf646a60a6c5ddc4c10ada553846d0c30be57d430f7b9b032139e8ef67816fca9ef9797f0239fb635f7831fe3213b920316d37d91c95607a3f658fcdcc2bfab5455575cd2289ef03c046ac5205011914adfb2a401f009a721f1d7d62ef175de3ec06c5e16756821e4a9b3b9910f58baaa66db21e3a045c47008b239a63bfe5fb3a54dcb9d44a20fc5b3ae807aefd07884a8fcff53d23474244a9f39", 0xc8}, {&(0x7f00000008c0)="071b538a351c8f67459d150e564cc0855cdd12c6b0b09d42211f53909640a9060d15226ae44c0fd1c449a1865b41c9b4f1913f6730f94337794262849808b2e6d63c152d61c4ec1715", 0x49}, {&(0x7f0000000940)="046f0b", 0x3}, {&(0x7f0000000980)="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", 0x1000}], 0x8}}, {{&(0x7f0000001a00)={0xa, 0x4e22, 0x0, @rand_addr="12b10f30a319f143b23ab7b173f52bc8", 0xfff}, 0x1c, &(0x7f0000001c80)=[{&(0x7f0000001a80)="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", 0xfa}, {&(0x7f0000001b80)="4aca947e60200922484b7c", 0xb}, {&(0x7f0000001bc0)="cdb179331097796564f34566848f6c9d0dafb35b76586177111876a903af2186452fe380858d2a5f04a5473a5f5afb5cd0768664f9c87f8e788abb18451b079135042937f9b11d7a72238092f724c84990a86ab29f1e50be0f5f21ce71780054fbd7d13b800b149bb735797b8fa48125e04e3a0b1f1e4c6bd5743aab99cfd4d0c7f07fdb40a5bd3921406300adc9b2834583f74b137b6be248b8bb25eb685cc6", 0xa0}], 0x3, &(0x7f0000001cc0)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @hopopts={{0x48, 0x29, 0x36, {0x2b, 0x5, [], [@jumbo={0xc2, 0x4, 0x8}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xb2}, @jumbo={0xc2, 0x4, 0x4}, @hao={0xc9, 0x10, @empty}]}}}, @dstopts={{0x140, 0x29, 0x37, {0x2c, 0x24, [], [@ra={0x5, 0x2, 0x2ac1}, @generic={0x40, 0xf4, "115bab9c4bebf5b4884415b48b2e0c2530a60b421c96ec05e58d5afea8a0130981ef0c0a54a706444464fd6c20e78785aa41be2ee5798417b542e120420abaf7d17dd70db0c65d38c1cc912837c144829bee79b69620b0513cedbd1756576b0274eca083b13e156cbeaa5650eab4029dbc29229ca8243808f34d0baade9f59b95930b93e8f263b54aec428e05fe72716e6bc038cf9df349872182fdcc5fedace24f0c49fbde435722e243b6387552cb12c8c42c366ab499a39dcbab4c567fc3c554ab2fcc7c85d7f64861482b8f96dcbe6a81260bfc91a112f2056075c8699a1debf7ac0a3f5043b14cd1b61afcb63fdcefb5c9d"}, @calipso={0x7, 0x28, {0xffff, 0x8, 0x9e, 0x8f11, [0xdaab, 0x4, 0x80000000, 0x6]}}]}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0xe819cedb661e34e9, 0x1, [], [@ra={0x5, 0x2, 0x3}, @ra={0x5, 0x2, 0x3}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1000}}, @dontfrag={{0x14, 0x29, 0x3e, 0x5}}, @hopopts={{0x38, 0x29, 0x36, {0x7a, 0x3, [], [@jumbo={0xc2, 0x4, 0x5}, @enc_lim={0x4, 0x1, 0x7f}, @hao={0xc9, 0x10, @mcast2}]}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}], 0x248}}, {{&(0x7f0000001f40)={0xa, 0x4e21, 0x9, @mcast2, 0x9}, 0x1c, &(0x7f0000003240)=[{&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="cebe41b42d5577b164493369ed89340f3f3cc32202caf58bafa0a39133d681c28c54405b80356034dfba5d9c19dfe1f0e79b24c89f75ce371366fca3e641184082191909b8d57c4b584e3f6553b27dbb57fd0804ab7af6028dc18a7adb22952e4afbd81a21490a639c6d954c869e34", 0x6f}, {&(0x7f0000003000)="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", 0xff}, {&(0x7f0000003100)="9e39e87501681f7ec0da643b604375aba3428a41fee49c5377be6ad5a2fc2b53430bdcfd55a6835382aea323e6d541a1a899792277b35673f8dfe4a58cd15f668effa57a29cf7b3b66ff21b2fbac168d850cd7acc5f7f6f735f53b18", 0x5c}, {&(0x7f0000003180)="0a8ad2af03bd56803213a5467fd0e34ac5df37e5b1d63ca3c91e7ff85c43588843ba1a5982a272e7f8828b4575e4483846b41ead7f0fae3bc73585ae463c2ab9720cbbfab06254a71d6d26da375ffec9693ffbe0247182acd8ae7ee93769537eb22aca3f92db17da99fd049d8a627ad639e149a109e10a4b9ff2aca21778b29b2ffdba6369d7ba6a1e4d0783d5b78e38d087a539f57c", 0x96}], 0x5, &(0x7f00000032c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x7}}], 0x18}}, {{&(0x7f0000003300)={0xa, 0x4e20, 0x27, @mcast2, 0xfffff001}, 0x1c, &(0x7f00000033c0)=[{&(0x7f0000003340)="a1cb4cd7840b142171799ea8fb8882958fffeceebc05e429c057344b950cd606006afa21eed9ec1b9f9c06e3012d31968e0d2fa165ec80b0996342e8be1b02d99b29ddb1870f3baa9311baa770ab4016972c2dded077b64760f76900fb14", 0x5e}], 0x1, &(0x7f0000003400)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @hopopts={{0x60, 0x29, 0x36, {0x4, 0x8, [], [@generic={0x7f, 0x18, "5c6780cb7b17c7068428986630f1b8af6d39d3407e475bcb"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8b}, @ra={0x5, 0x2, 0x5}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0xfffffe01}, @enc_lim={0x4, 0x1, 0x7f}, @calipso={0x7, 0x10, {0x4d, 0x2, 0xff, 0xf6, [0x4]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x3}}, @hoplimit={{0x14}}, @rthdr={{0x98, 0x29, 0x39, {0x2c, 0x10, 0x0, 0x7, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @loopback, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2, @loopback, @mcast2, @dev={0xfe, 0x80, [], 0x12}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x2e, 0x1, [], [@enc_lim={0x4, 0x1, 0x3f}, @jumbo={0xc2, 0x4, 0xfffffff7}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x32, 0x6, 0x0, 0xff, 0x0, [@local, @empty, @mcast1]}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x33, 0x2, [], [@pad1, @ra={0x5, 0x2, 0x3}, @ra={0x5, 0x2, 0x4}, @pad1, @enc_lim={0x4, 0x1, 0x4}]}}}], 0x1e0}}], 0x6, 0x0) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) [ 894.713527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 894.720785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 894.728045] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 894.735306] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 894.742948] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 894.749421] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 894.759948] JFS: discard option not supported on device 14:15:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) socket$inet_udp(0x2, 0x2, 0x0) [ 894.768819] JFS: discard option not supported on device [ 894.778181] jfs: Unrecognized mount option "d" or missing value 14:15:07 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) [ 894.810678] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 894.817278] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 894.820108] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 894.837848] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 894.848043] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env 14:15:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) [ 894.858828] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 894.870079] net_ratelimit: 14 callbacks suppressed [ 894.870084] protocol 88fb is buggy, dev hsr_slave_0 [ 894.880143] protocol 88fb is buggy, dev hsr_slave_1 [ 894.889048] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 894.901332] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:15:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000280)={{0x0, @name="834f97e7a535af28dd4d6819d9dbecaeb606696ccffdbf84f9d0a75c0dfbf54a"}, "84494b62dc0746347a118005763e5300a8321048f88b6c7ac705c7005cde7b51", 0x1}) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:07 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x40}, 0x0, 0x0, 0x0, 0x14, 0x0, 0x7f, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r3, r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="180d3d32a2e5c36438d1469c6e2cafa5ef246f36beda1a58577782ae74b05b458dd0f19f60853e1bc32f768ab7496ade0851654e927b6b612465ef9aa9d0f92976bef8af4c76d7e0bb8119788ca26d290eaebb97eda74e289b011277abfd129301172250a9d4a5e7fcbe285016e7ae8b8ea1297ec83ac3b3b60bb644e96136c9b473ec80026b4101b472577b261703674ca496aa9b875ffaee94d133db89eb66c734149c0816d791a35c3c43770b38eb1759aeb3edec0fbbbaf1d6f241cfba1f14f566d0b31142df27deeea1cffda4a8a6d11d93f4", 0xd5) [ 894.903398] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 894.926591] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 894.937873] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 894.946526] FAULT_INJECTION: forcing a failure. [ 894.946526] name failslab, interval 1, probability 0, space 0, times 0 [ 894.962709] CPU: 1 PID: 10176 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 894.970708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.980165] Call Trace: [ 894.982769] dump_stack+0x142/0x197 [ 894.986524] should_fail.cold+0x10f/0x159 [ 894.990779] should_failslab+0xdb/0x130 [ 894.994856] __kmalloc+0x2f0/0x7a0 [ 894.998382] ? kasan_kmalloc+0xce/0xf0 [ 895.002261] ? kobject_get_path+0xbb/0x1a0 [ 895.006482] kobject_get_path+0xbb/0x1a0 [ 895.010609] ? devm_device_remove_groups+0x50/0x50 [ 895.015546] kobject_uevent_env+0x39c/0xc23 [ 895.019868] ? internal_create_group+0x49a/0x7b0 [ 895.024636] kobject_uevent+0x20/0x26 [ 895.028439] lo_ioctl+0x11e7/0x1ce0 [ 895.032052] ? loop_probe+0x160/0x160 [ 895.035859] blkdev_ioctl+0x96b/0x1860 [ 895.039753] ? blkpg_ioctl+0x980/0x980 [ 895.043635] ? __might_sleep+0x93/0xb0 [ 895.047518] block_ioctl+0xde/0x120 [ 895.051243] ? blkdev_fallocate+0x3b0/0x3b0 [ 895.055565] do_vfs_ioctl+0x7ae/0x1060 [ 895.059539] ? selinux_file_mprotect+0x5d0/0x5d0 [ 895.064277] ? lock_downgrade+0x740/0x740 [ 895.068423] ? ioctl_preallocate+0x1c0/0x1c0 [ 895.072817] ? __fget+0x237/0x370 [ 895.076342] ? security_file_ioctl+0x89/0xb0 [ 895.080914] SyS_ioctl+0x8f/0xc0 [ 895.084262] ? do_vfs_ioctl+0x1060/0x1060 [ 895.088392] do_syscall_64+0x1e8/0x640 [ 895.092260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.097099] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 895.102271] RIP: 0033:0x45a787 [ 895.105457] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 895.113146] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 895.120395] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 895.127656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 895.134914] R10: 0000000000000075 R11: 0000000000000246 R12: 00007fd3c5cc16d4 [ 895.142186] R13: 00000000004cadb6 R14: 00000000004e43f0 R15: 0000000000000003 [ 895.155787] JFS: discard option not supported on device [ 895.160699] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 895.161699] JFS: discard option not supported on device [ 895.171983] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 895.173279] jfs: Unrecognized mount option "d" or missing value [ 895.196238] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 895.202868] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 895.221422] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 895.227962] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 895.238415] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 895.245128] kobject: 'loop5' (ffff8880a41ef720): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:15:08 executing program 3: socket$inet(0x2, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x4, 0x3f, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0918, 0x10001, [], @ptr=0x20}}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) 14:15:08 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x94\x00\x01\xb0\x00', 0x2, 0x3, 0x248, 0x0, 0x0, 0x0, 0xe0, 0xe0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', 'eql\x00\xbc\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x69eda65cc18a3dd8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, '\x01\x00\x00\x00\x00\x00\x00\xedO\x00\x00/\xbcG4\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a8) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000080)={'filter\x00', 0x4, "909bc158"}, &(0x7f0000000180)=0x28) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000100)=""/107) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:15:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) r1 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r1, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffc, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 14:15:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0}]) [ 895.352832] kobject: 'loop3' (ffff8880a412e520): kobject_uevent_env [ 895.364623] kobject: 'loop3' (ffff8880a412e520): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 895.410391] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 895.422878] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 895.436020] kobject: 'loop2' (ffff8880a41235e0): kobject_uevent_env [ 895.443644] kobject: 'loop2' (ffff8880a41235e0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 895.520130] protocol 88fb is buggy, dev hsr_slave_0 [ 895.525284] protocol 88fb is buggy, dev hsr_slave_1 [ 895.530570] protocol 88fb is buggy, dev hsr_slave_0 [ 895.535701] protocol 88fb is buggy, dev hsr_slave_1 14:15:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r1, 0x1000000) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x401, 0x5, 0x8, 0x3, 0x10001, 0x9d45, 0x8}, 0xffffffffffffff8e) getsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000000040), &(0x7f0000000140)=0x4) sendfile(r0, r1, 0x0, 0xeefffdef) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) r5 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x230, 0x10000) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000000c0)={0x7ff}) r6 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x3f, 0x800) fadvise64(r6, 0x200, 0xd3cb, 0x2) 14:15:08 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='grpquota,discard,discard,quota,iocharset=iso8859-3,d']) 14:15:08 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='\x00+\xba\xad\xa3\xde\xb6\x8bx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0xa800) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000080)=ANY=[@ANYBLOB="e806e8a90795d667392ff39ee285f100"]) r2 = syz_open_pts(r0, 0x2002) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r2, r0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)={0x9e, 0x3, "a8ce23cf84ceaead8d67e2af3e7536f902da92aff15ad6f5ca85a5525f9ba1f9b8fb28791ccbbd42f612767c5deab7e2d9cd46ca8f729a3893f8936575f218c3efc7f58951cd5d73522682e41d6a60002e55117e4511b43bd8f8ca5b1d172f40736abe72d0622ae9ab91fcc08461c0eca2417128031e85b45e392a8a030b1dd304b7f834c33313aa0e0264a4769fbd72d14eca9bde16"}, 0x40000) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:15:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0}]) 14:15:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000001a40)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)}, 0x8000) recvfrom$inet6(r0, 0x0, 0xfffffee4, 0x0, 0x0, 0x171d83f7f4539308) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r0, &(0x7f00000003c0)='T', 0x1, 0x0, 0x0, 0x0) 14:15:08 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) tgkill(0x0, r0, 0x32) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x60080, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000080)={0x8, 0xfffffffc, 0x6, 0x1, 0x80}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r1, 0x2002) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r4 = gettid() r5 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) getpeername$ax25(r5, &(0x7f00000003c0)={{0x3, @default}, [@bcast, @netrom, @default, @remote, @bcast, @null, @remote, @default]}, &(0x7f00000002c0)=0x48) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x8, 0x7}, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000340)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'L+'}, 0x16, 0x2) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x4800, 0x0) tkill(r4, 0x13) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r3, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) [ 895.614028] kobject: 'loop5' (ffff8880a41ef720): kobject_uevent_env [ 895.624458] FAULT_INJECTION: forcing a failure. [ 895.624458] name failslab, interval 1, probability 0, space 0, times 0 [ 895.640693] kobject: 'loop4' (ffff8880a41b2e20): kobject_uevent_env [ 895.647228] CPU: 0 PID: 10218 Comm: syz-executor.5 Not tainted 4.14.160-syzkaller #0 [ 895.651053] kobject: 'loop4' (ffff8880a41b2e20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 895.655132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.655136] Call Trace: [ 895.655155] dump_stack+0x142/0x197 [ 895.655169] should_fail.cold+0x10f/0x159 [ 895.684319] should_failslab+0xdb/0x130 [ 895.688287] __kmalloc+0x2f0/0x7a0 [ 895.691933] ? kasan_kmalloc+0xce/0xf0 [ 895.695820] ? kobject_get_path+0xbb/0x1a0 [ 895.700081] kobject_get_path+0xbb/0x1a0 [ 895.704166] ? devm_device_remove_groups+0x50/0x50 [ 895.709085] kobject_uevent_env+0x39c/0xc23 [ 895.713498] ? internal_create_group+0x49a/0x7b0 [ 895.718247] kobject_uevent+0x20/0x26 [ 895.722036] lo_ioctl+0x11e7/0x1ce0 [ 895.725653] ? loop_probe+0x160/0x160 [ 895.729537] blkdev_ioctl+0x96b/0x1860 [ 895.733437] ? blkpg_ioctl+0x980/0x980 [ 895.737358] ? __might_sleep+0x93/0xb0 [ 895.741243] block_ioctl+0xde/0x120 [ 895.744863] ? blkdev_fallocate+0x3b0/0x3b0 [ 895.749178] do_vfs_ioctl+0x7ae/0x1060 [ 895.753062] ? selinux_file_mprotect+0x5d0/0x5d0 [ 895.757806] ? lock_downgrade+0x740/0x740 [ 895.761942] ? ioctl_preallocate+0x1c0/0x1c0 [ 895.766335] ? __fget+0x237/0x370 [ 895.769799] ? security_file_ioctl+0x89/0xb0 [ 895.774198] SyS_ioctl+0x8f/0xc0 [ 895.777551] ? do_vfs_ioctl+0x1060/0x1060 [ 895.781695] do_syscall_64+0x1e8/0x640 [ 895.785577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.790417] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 895.795609] RIP: 0033:0x45a787 [ 895.798803] RSP: 002b:00007fd3c5cc0a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 895.806499] RAX: ffffffffffffffda RBX: 00007fd3c5cc0c90 RCX: 000000000045a787 [ 895.813760] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 895.821025] RBP: 000000000075bf20 R08: 0000000000000000 R09: 00