0x0, 0x0, 0x0, &(0x7f0000000480)=0x4}}, 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r5 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x6, 0x2fdb05ae3062b494) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f00000001c0)={0x22, &(0x7f0000000180)=""/34}) write$FUSE_INTERRUPT(r3, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x4e20, 0x3, @local, 0x401}, 0x1c) 17:30:45 executing program 0: socketpair(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x00\x00\x00\x02\xbdh\x00') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000340)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e21, 0x3, @rand_addr="2ef2b435b1d60738e0f17cf3e912e3a9", 0x6}, @in6={0xa, 0x4e20, 0x9, @loopback, 0x2}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x49d, @empty, 0x100000000}], 0xc0) 17:30:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:45 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0xa) 17:30:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22, 0x0) 17:30:45 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce4432feb14fdbe86c600fe00"]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000300)={0xa, [0x7, 0x0, 0x7e2974b7, 0x1f, 0x1, 0x8, 0xd83, 0x401, 0x0, 0x7]}, 0x18) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xa4, 0x6, 0x7fffffff, "3f04c678ace572705e215d66cb216e47", "50fd821beae5ea83bfb5e75d2ba867c17b2bb3e8bb46c3d80c21dee15093d28cb74d688f7789e1f7c07f4c1d6565fbfa3b3ca2a4a9d0add457034dbb22d84f5c97656c4a925bbd83888977b8f945a02c99cf682af333da3499db93acb7f397f1e27fb8c59b4e9d66be4ad114804b4bab9d5c4abccb4c015007ef91245c366f30e41b84901659b135d5a323248fa38c"}, 0xa4, 0x1) accept4(r1, &(0x7f0000000340)=@alg, &(0x7f00000003c0)=0x80, 0x80000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) 17:30:45 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x00\x00\x00\x02\xbdh\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000540)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)=0x0) rt_tgsigqueueinfo(r2, r3, 0x1a, &(0x7f00000005c0)={0x2f, 0x1, 0x4}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x200, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000500)) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x3e, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000240)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e22, @broadcast}, 0x2db, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller0\x00', 0x3, 0x986, 0x6}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0xfffffffffffffffd, 0x0) recvfrom$inet6(r0, &(0x7f00000001c0)=""/11, 0xb, 0x2022, &(0x7f00000002c0)={0xa, 0x4e23, 0x88, @mcast1, 0x40}, 0x1c) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000080)={0x10001}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x90, r6, 0xe38, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe47}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x363a6ec2}]}, 0x90}, 0x1, 0x0, 0x0, 0x20008000}, 0x90) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 17:30:45 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x10) 17:30:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x23, 0x0) 17:30:45 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x606000) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x2) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='vd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x24, 0x0) 17:30:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x25, 0x0) 17:30:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x200040, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}}) read$FUSE(r0, &(0x7f00000040c0), 0xfffffffffffffe0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 17:30:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x48) 17:30:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x26, 0x0) 17:30:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:46 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x7d8f, 0x410000) accept$nfc_llcp(r0, 0x0, &(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000006bd83071bd4fe5a2560e3b174693b796d1076c6e51856822f33016be67d2cd474f7582c4226e0e76f043f00f606133b4d91b827af4bc0d05c88803600abde1a43b906968fc544930a59047bedf1e14140f71ce", @ANYRES16=r3, @ANYBLOB="080025bd7000fcdbd72503e6000008000600080003005605000000000000c53f"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40001) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8943, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x00\x00\x00\x02\xbdh\x00') ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000340)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 17:30:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="b85fc9455ceedbc8da9d5c74207efcf1ab61c3e18e4d11e23ad289245df4656320bff6a55171c731e882cec64695a8e360baad651fd28f6a9be0cf424b223a5953ab992b3749ee8b14c1f6fc2b44f247d4c309bcf75695d90604732d61c805824a99a745733a8ada1ed664cf2d89af0b46206cabc2e042b7297324a19438f3adcfa0c1f1bda33f4405e4eed677aa38009e08f768578d7012ef55371dca29511798246c0723dc12f8b8018ad1e8d88215c409dc572be9dcd8c2fed61670636cb5dd1e449189c4456ca47afdef5e1b9c03c82b9f110285ea54b23635ba98bf4b3533835b04edf83e8355", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x3}, 0x2c) 17:30:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x27, 0x0) 17:30:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4c) 17:30:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x34) write$FUSE_GETXATTR(r0, &(0x7f0000001f40)={0x18, 0x0, 0x6, {0x80}}, 0x18) stat(&(0x7f0000000180)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x40000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0xa548}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '{{'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r3}}, {@subj_type={'subj_type', 0x3d, 'user_id'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fcbe67f}}, {@appraise_type='appraise_type=imasig'}]}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) recvmmsg(r0, &(0x7f00000050c0)=[{{&(0x7f00000005c0)=@xdp, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/156, 0x9c}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/136, 0x88}, {&(0x7f00000018c0)=""/191, 0xbf}, {&(0x7f0000001980)=""/220, 0xdc}, {&(0x7f0000001a80)=""/176, 0xb0}, {&(0x7f0000001b40)=""/191, 0xbf}], 0x8}, 0x7fffffff}, {{&(0x7f0000001c80)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000001d00)=""/30, 0x1e}, {&(0x7f0000001d40)=""/28, 0x1c}, {&(0x7f0000001d80)=""/187, 0xbb}], 0x4, &(0x7f0000001e80)=""/38, 0x26}, 0x1831}, {{&(0x7f0000001ec0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001f40), 0x0, &(0x7f0000001f80)=""/4096, 0x1000}, 0x3f}, {{&(0x7f0000002f80)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000003480)=[{&(0x7f0000003000)=""/178, 0xb2}, {&(0x7f00000030c0)=""/175, 0xaf}, {&(0x7f0000003180)=""/187, 0xbb}, {&(0x7f0000003240)=""/228, 0xe4}, {&(0x7f0000003340)=""/62, 0x3e}, {&(0x7f0000003380)=""/93, 0x5d}, {&(0x7f0000003400)=""/77, 0x4d}], 0x7, &(0x7f0000003500)=""/72, 0x48}, 0x2}, {{&(0x7f0000003580)=@l2, 0x80, &(0x7f0000003840)=[{&(0x7f0000003600)=""/171, 0xab}, {&(0x7f00000036c0)=""/13, 0xd}, {&(0x7f0000003700)=""/94, 0x5e}, {&(0x7f0000003780)=""/4, 0x4}, {&(0x7f00000037c0)=""/107, 0x6b}], 0x5}, 0x3}, {{&(0x7f00000038c0)=@can, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003940)=""/240, 0xf0}, {&(0x7f0000003a40)=""/181, 0xb5}, {&(0x7f0000003b00)=""/212, 0xd4}, {&(0x7f0000003c00)=""/220, 0xdc}, {&(0x7f0000003d00)=""/197, 0xc5}, {&(0x7f0000003e00)=""/43, 0x2b}, {&(0x7f0000003e40)=""/84, 0x54}, {&(0x7f0000003ec0)=""/19, 0x13}], 0x8, &(0x7f0000003f80)=""/166, 0xa6}, 0x6}], 0x6, 0x20, 0x0) read$FUSE(r4, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r4, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x68) 17:30:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x28, 0x0) 17:30:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x1c9c380}, 0x80000000, 0x80000000}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',g\x00oup_id=', @ANYRESDEC=0x0, @ANYBLOB="dd00"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:47 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x00\x00\x00\x02\xbdh\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x50000) ioctl$TCFLSH(r2, 0x540b, 0x3f) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 17:30:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x29, 0x0) 17:30:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6c) 17:30:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000001440)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000001480)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRESDEC=0x0, @ANYRESOCT=r1]) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x8, 0x1c1000) fcntl$setstatus(r2, 0x4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x1, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000001600)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001400)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) accept4$tipc(r2, &(0x7f0000000180), &(0x7f00000013c0)=0x10, 0x0) sendmsg$key(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001540)={0x2, 0xf, 0x7ff, 0x2, 0x12, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_spirange={0x2, 0x10, 0x4d4, 0x4d2}, @sadb_ident={0x2, 0xb, 0x1, 0x0, 0x10000}, @sadb_x_filter={0x5, 0x1a, @in=@local, @in=@remote, 0x1b, 0x0, 0x10}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x8000, @mcast2, 0xc011}, @in={0x2, 0x4e21, @broadcast}}]}, 0x90}}, 0x4) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f00000014c0)="f56185b255884ad878547acb176d948c0cdbc55ff3fd5181edc67f4557271f6d190993b0b9330d112750cdb376856aeb0241999f60f60a4e6f74058dfa338a8706734db21568c6eee1f8c7b47532822c075111f285745e", &(0x7f0000001680)=""/150}, 0x18) 17:30:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:47 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x100, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x57, 0x100) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000200)='U\x02\xbdh\x00'/15) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 17:30:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x74) 17:30:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2a, 0x0) 17:30:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:48 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x9, 0x2, 0x5}, 0x4}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:48 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x00\x00\x00\x02\xbdh\x00') setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x6b16, 0x7f, 0x8}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'nlmon0\x00', 0x43732e5398416f1c}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x12, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x54}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8}, 0x23e) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) write$USERIO_CMD_REGISTER(r4, &(0x7f00000000c0)={0x0, 0xffff}, 0x2) 17:30:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2b, 0x0) 17:30:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7a) 17:30:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2c, 0x0) 17:30:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x300) 17:30:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2d, 0x0) 17:30:48 executing program 0 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:49 executing program 2: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x110) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x500) [ 475.879382][T32286] FAULT_INJECTION: forcing a failure. [ 475.879382][T32286] name failslab, interval 1, probability 0, space 0, times 0 17:30:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2e, 0x0) 17:30:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) [ 475.943655][T32286] CPU: 1 PID: 32286 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 475.951697][T32286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.961764][T32286] Call Trace: [ 475.965085][T32286] dump_stack+0x172/0x1f0 [ 475.969444][T32286] should_fail.cold+0xa/0x15 [ 475.974087][T32286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.979917][T32286] ? ___might_sleep+0x163/0x280 [ 475.984803][T32286] __should_failslab+0x121/0x190 [ 475.989742][T32286] should_failslab+0x9/0x14 [ 475.994231][T32286] kmem_cache_alloc_trace+0x2d1/0x760 [ 475.999612][T32286] ? _parse_integer+0x139/0x190 [ 476.004454][T32286] alloc_pipe_info+0xb9/0x430 [ 476.009140][T32286] splice_direct_to_actor+0x775/0x970 [ 476.014508][T32286] ? generic_pipe_buf_nosteal+0x10/0x10 [ 476.020041][T32286] ? lock_downgrade+0x880/0x880 [ 476.024876][T32286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.031118][T32286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.037346][T32286] ? do_splice_to+0x190/0x190 [ 476.042013][T32286] ? rw_verify_area+0x118/0x360 [ 476.046889][T32286] do_splice_direct+0x1da/0x2a0 [ 476.051741][T32286] ? splice_direct_to_actor+0x970/0x970 [ 476.057278][T32286] ? rw_verify_area+0x118/0x360 [ 476.062136][T32286] do_sendfile+0x597/0xd00 [ 476.066556][T32286] ? do_compat_pwritev64+0x1c0/0x1c0 [ 476.071824][T32286] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 476.078053][T32286] ? fput+0x1b/0x20 [ 476.081859][T32286] __x64_sys_sendfile64+0x1dd/0x220 [ 476.087051][T32286] ? __ia32_sys_sendfile+0x230/0x230 [ 476.092337][T32286] ? do_syscall_64+0x26/0x610 [ 476.097021][T32286] ? lockdep_hardirqs_on+0x418/0x5d0 [ 476.102311][T32286] ? trace_hardirqs_on+0x67/0x230 [ 476.107335][T32286] do_syscall_64+0x103/0x610 [ 476.111921][T32286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.117801][T32286] RIP: 0033:0x4582b9 [ 476.121738][T32286] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:30:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x600) [ 476.141373][T32286] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 476.151260][T32286] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 476.159254][T32286] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 476.167256][T32286] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.175221][T32286] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 476.183188][T32286] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:49 executing program 0 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:49 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x3ec, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0xa}}, 0x10) 17:30:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x700) [ 476.454588][T32313] FAULT_INJECTION: forcing a failure. [ 476.454588][T32313] name failslab, interval 1, probability 0, space 0, times 0 [ 476.468325][T32313] CPU: 0 PID: 32313 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 476.476323][T32313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.476330][T32313] Call Trace: [ 476.476359][T32313] dump_stack+0x172/0x1f0 [ 476.476384][T32313] should_fail.cold+0xa/0x15 [ 476.476407][T32313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.476432][T32313] ? ___might_sleep+0x163/0x280 [ 476.476456][T32313] __should_failslab+0x121/0x190 [ 476.476485][T32313] should_failslab+0x9/0x14 [ 476.518788][T32313] __kmalloc+0x2dc/0x740 [ 476.523040][T32313] ? kmem_cache_alloc_trace+0x354/0x760 [ 476.523063][T32313] ? alloc_pipe_info+0x199/0x430 [ 476.523083][T32313] alloc_pipe_info+0x199/0x430 [ 476.523104][T32313] splice_direct_to_actor+0x775/0x970 [ 476.523123][T32313] ? generic_pipe_buf_nosteal+0x10/0x10 [ 476.543709][T32313] ? lock_downgrade+0x880/0x880 [ 476.554182][T32313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.560460][T32313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.566715][T32313] ? do_splice_to+0x190/0x190 [ 476.571443][T32313] ? rw_verify_area+0x118/0x360 [ 476.576415][T32313] do_splice_direct+0x1da/0x2a0 [ 476.581850][T32313] ? splice_direct_to_actor+0x970/0x970 [ 476.587413][T32313] ? rw_verify_area+0x118/0x360 [ 476.587432][T32313] do_sendfile+0x597/0xd00 [ 476.587458][T32313] ? do_compat_pwritev64+0x1c0/0x1c0 [ 476.587474][T32313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 476.587489][T32313] ? fput+0x1b/0x20 [ 476.587509][T32313] __x64_sys_sendfile64+0x1dd/0x220 [ 476.587532][T32313] ? __ia32_sys_sendfile+0x230/0x230 [ 476.602048][T32313] ? do_syscall_64+0x26/0x610 [ 476.602067][T32313] ? lockdep_hardirqs_on+0x418/0x5d0 [ 476.602084][T32313] ? trace_hardirqs_on+0x67/0x230 [ 476.602110][T32313] do_syscall_64+0x103/0x610 [ 476.642288][T32313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.648255][T32313] RIP: 0033:0x4582b9 [ 476.652226][T32313] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.671884][T32313] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 476.680287][T32313] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 476.688256][T32313] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 476.696216][T32313] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.704189][T32313] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 476.712186][T32313] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x2f, 0x0) 17:30:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x900) 17:30:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:50 executing program 0 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:50 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 477.061877][T32327] FAULT_INJECTION: forcing a failure. [ 477.061877][T32327] name failslab, interval 1, probability 0, space 0, times 0 17:30:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x30, 0x0) 17:30:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0xa00) [ 477.121581][T32327] CPU: 1 PID: 32327 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 477.129623][T32327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.139721][T32327] Call Trace: [ 477.143382][T32327] dump_stack+0x172/0x1f0 [ 477.147745][T32327] should_fail.cold+0xa/0x15 [ 477.152353][T32327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.158194][T32327] ? ___might_sleep+0x163/0x280 [ 477.163082][T32327] __should_failslab+0x121/0x190 [ 477.168025][T32327] should_failslab+0x9/0x14 [ 477.172547][T32327] kmem_cache_alloc_node_trace+0x270/0x720 [ 477.178374][T32327] ? lock_downgrade+0x880/0x880 [ 477.183275][T32327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.189519][T32327] __kmalloc_node+0x3d/0x70 [ 477.194029][T32327] kvmalloc_node+0x68/0x100 [ 477.198549][T32327] iov_iter_get_pages_alloc+0x862/0x1350 [ 477.204234][T32327] ? unwind_get_return_address+0x61/0xa0 [ 477.209883][T32327] ? __save_stack_trace+0x99/0x100 [ 477.215013][T32327] ? iov_iter_revert+0xaa0/0xaa0 [ 477.219948][T32327] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 477.225851][T32327] ? iov_iter_pipe+0xba/0x2f0 [ 477.230547][T32327] default_file_splice_read+0x199/0x890 [ 477.236094][T32327] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 477.242067][T32327] ? kasan_kmalloc+0x9/0x10 [ 477.246578][T32327] ? __kmalloc+0x15c/0x740 [ 477.251002][T32327] ? alloc_pipe_info+0x199/0x430 [ 477.255929][T32327] ? do_sendfile+0x597/0xd00 [ 477.260507][T32327] ? do_syscall_64+0x103/0x610 [ 477.265271][T32327] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.271353][T32327] ? __lock_acquire+0x548/0x3fb0 [ 477.276290][T32327] ? iter_file_splice_write+0xbe0/0xbe0 [ 477.281921][T32327] ? percpu_ref_put_many+0x94/0x190 [ 477.287124][T32327] ? percpu_ref_put_many+0x94/0x190 [ 477.292335][T32327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.298575][T32327] ? fsnotify+0x811/0xbc0 [ 477.302893][T32327] ? fsnotify+0xbc0/0xbc0 [ 477.307226][T32327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.313453][T32327] ? fsnotify_first_mark+0x210/0x210 [ 477.318817][T32327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.325070][T32327] ? security_file_permission+0x94/0x380 [ 477.330701][T32327] ? iter_file_splice_write+0xbe0/0xbe0 [ 477.336269][T32327] do_splice_to+0x12a/0x190 [ 477.340767][T32327] splice_direct_to_actor+0x2d2/0x970 [ 477.346131][T32327] ? generic_pipe_buf_nosteal+0x10/0x10 [ 477.351720][T32327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.357961][T32327] ? do_splice_to+0x190/0x190 [ 477.362651][T32327] ? rw_verify_area+0x118/0x360 [ 477.367519][T32327] do_splice_direct+0x1da/0x2a0 [ 477.372398][T32327] ? splice_direct_to_actor+0x970/0x970 [ 477.377960][T32327] ? rw_verify_area+0x118/0x360 [ 477.382836][T32327] do_sendfile+0x597/0xd00 [ 477.387271][T32327] ? do_compat_pwritev64+0x1c0/0x1c0 [ 477.392551][T32327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 477.398802][T32327] ? fput+0x1b/0x20 [ 477.402632][T32327] __x64_sys_sendfile64+0x1dd/0x220 [ 477.407832][T32327] ? __ia32_sys_sendfile+0x230/0x230 [ 477.413109][T32327] ? do_syscall_64+0x26/0x610 [ 477.417774][T32327] ? lockdep_hardirqs_on+0x418/0x5d0 [ 477.423059][T32327] ? trace_hardirqs_on+0x67/0x230 [ 477.428211][T32327] do_syscall_64+0x103/0x610 [ 477.432793][T32327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.438670][T32327] RIP: 0033:0x4582b9 [ 477.442580][T32327] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.462193][T32327] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 477.470600][T32327] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 477.478577][T32327] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 477.486572][T32327] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.494569][T32327] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 477.502531][T32327] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:50 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x1015, 0x1, 0x5a6, "c952a237110ab19957ba4b1107af35c3", "eef5adf182ea3d0a0c4afac8ce4d5c7e2f819e32abb9972ae79ab21272dd629ea7854231eae73c2be74e2d2fe063b6867df5d6feda0e464f8d44160fbb93572fc47c7394e6ee2cde7a1b77f1333d2599e3aff441f8655ee4438614255b4778f444af20c043b097349699f22238459a0c4a1257442be346a2808701a5877fe3ec281ba93e97fa1f3fa38ff55507bc219da271b90e8749839ba8a92182c1efdd7d03ef711f90f043d5303b1189681556944ff47a02eea06a39156b8702ed753ea4e89c5aaa91faa35361df5e12e2a48264f0e3aeab27a9dfbb0c361ecc9e50ad5011b57f9baae08da7b4249b007977bbb96880725723c057d19a5ec6bdd96a4898fe3b95440dc577665a74758da9d2231bce7a17fe67635a235672c37c97380592b5e46505382edb3fcef4dbcc17b2446891acdb78fad4b7a190761dac1ab8827823e4bc7e202367afc79455444c25ead645fc903e11158aa38842c7ce3cbce5e08da56417e993e588df4a1d30c1d29fa74bde24b6d8c8950c52664718c5559c7debe2aba99ee7d3089285e703a4766da7839a361c765ca49a7cb9baabaf2e6267d82bf8c3039927564c9bb6ef6c2239742e3b32de608f794511d582e4cd1e6552906f195f74178bb80bf2e3badefbf82d81fba3c857eb7c6a170f17fd381d37c28dd57087f09e6c56d5048ac064eb0984c5c95621192c018b79ac8f946822cddafbe941b7df77fb8cbf5f9faf18efb0538a886d41ac227f9473f831f097d5be72b9e9a031e8357f8eb07e48cfb1628baf5e79ba2e527f12446fc19bbe4a38c73a2905164994613175c803af2fa0e30b24af35ee6d1777ddb2c1ce448b07f332d9ccf3ee13284f1f97ed830a961b983b15622bd80fd180becd23925d8f0d2470462c8e0f0f9e14f47c5a7f95287b7cdb1972c2e085b7e536604ca995a396fba63223f62e1d0ba33a1eb5f4abede8d4c84516cc6df129627d6add61c11136e4177e234ffc758ff8c310de03f8ba2a682ab064e8b44443bbb90b3f0d976a39c2e821492b393bc3772a1ff90d651eba59bada3346e4f7d074391400f7864bb041690d7436e8e7115c0131c68b36f7a9bfb71cce75ec305749b111f747618d24579399efe432ff3b5075e073d10a14951a3aae556895c8dbc8f08bc4ce4be6205fb39d64dd15640fdf27c7680ac1153605f22fba9b5c3a0aec33cbd38fc08999e97c0a5f457afc338fdd3727375cee5e2b0f0053e3f1557782737609b1ffa2cf202bf0fac831103dacc08dc2fe5e7441528d02f308070ae356b685f2782bafe1fef4fffe2e4000a91f94fef4a2ede1c881d2eb2fb43440329546c3617dc2e8a9ceb555eb7ae456840eeb5cb5fa9182e3d68c625d4806d43e24041677251bbe0fc6e516921091522c16c34b9126103be0a7696bbc7f47af976711a7d9b3b8144d1cc193062c0ae790f8cb86b0b6e6f36ee9b59848a61548778ba21307496f03160f11478ce8d56147e302bc03da0140881d84159593ad8aeab8ba8df08acf4331cddcc783c5ef8666471ec68f4f8fafd22ae47866bbff2f91106aa173f89f2a3803e0ed19fb533cb10678f22a733ed9784a3c0693cd86271fb22351305928f4c31c9dc8eaf315da8af61123f45281b1045ad0896ab4f7839050f02f4e5ebda8ad098cb60709529c6c14cb7f88a2a7cc93ec22a334ed9c587786d256cc392df5d5fb5a9ede1dc75c8f522d34476b13dd80e4e31781c38ab5d743dc0eee12899fa6541db9f16c57a4e932a05f960d4e973aebdf57d973964937627710f526caa73787d98d61eb9c5253d286c69b84a0a0e91562d75f731d334a0e62a8e771c81dd88567d9e8451ca4413a9c8016ff03996b41c0762f402c181c00ee41ca9b453b02713ecd40cece700215d7b39a55a9899deca7100e68bdc0faa05c1ebd169a3ff03b3758ae4fa3118c9342312ca9ef48e9ef1faf63052bab86631770398c0162300be42cebc6ccc277959397233b6dbd0efdcaf3317fbcf0a27b81d6f13f38a211b8f8356780190662b717593a1073f3ae9f39475264435c889fdf9e0e492b41b50ff782e8afe9cfe755bef98d29278b20e4fbae82d0733edf02c837e6470de2feacd5dddfb2d4c76298d09e0d4d87cbf2345610c1f8773afaa0b793d7c1bc2f952feade8519733f68cc606cb2e20893280a720841952bcfe89996e7435e6d4a6f9e6b4e5144caa242356b18a278f4acf364e8c421ee195ac9455113a631bd125f50585286c193582fe04c7f68dad726e36cdcfa4d887e66d813bcb0675369f7a65e7fae3c194f4eb8c5260cd5a4090928a5d480ffc3981a9c2ea6497a9cad0658fa36ab973867728e881f1b4a3bcc897fb52079bf9851b67a32228322f27e9f8bebc54eb921062337c142112580ee0bccf5305ef067afaa16cd598a51d93aabf68e8d5342a5a0f56301910a124c22a38cf2168a4f6fd608820ba7ee52b51deaa7beade6a197abfe35f025bc8967f8123dce354091d636641752c71ffccaf634d57fea5e191494e34fc61f3f367f8e501cb8d21fcc2271ebc63a222da5dfd8dd8e83a9512609f2bb2116cedd53573bee2f53b6ed11dcfaa2e51f445a2a2c189b00101dd9317992038d6aa4e720f4c9f8fe3fa831c51d0acbbba6f041a632820eadbcf93de6eadbd2385eda583508f4530c0935df215a4d9a5d1b6e0d7e9dc2e18e8f7ebcc51c68d95539aebd497d351847187066ecc35083737cc9eab79077cffbbe8261488e0953cb51e6bdd8cb7c1c8b33fbd4b676e100c393e00028c0bfde47044edfae94783b3e58ff85334122249b163df0586d5027587a71cb9613ae52af701e01501c324d9d15a2ca2ac0732ce872b2de665e874d7ab7c617fcc20909ca35039dc0aadd991c2fac022f70bda4d40fc63dc25d711d832e642d8861c0435f133bbbceb5f259408434b057cc6bf9c18a312b219a48d2bde94db4246139399a053096a0e5a35c3ab5bd51a7b2f80acf5620dfd1a8b48da344fd7ca9dd245e27e81e2e4a395d72981c12a224aec5aa1820c53bd311b9c46bcf461eb6a25263f277578723ecfc90cfc8331186724ab5467654a0aadf76311ea64c55ef079095699f6bf727801c7f64bffc31c58eb65a3cd7b9d0eac7f4e26688024d1042c3237a0be138ed06c59ac6eaa0b6a531c9e8841b854da246ae156ae5a27a21e1477b1fd2c2d429c0e0dfaf7896bc07639d2e07d0eadd9aa1d2ac7fc098c4bda85ffe18aec16b006c81bf0fbcc8ec98eacdd6fffb94f4047055f36775b9fddc6a1cb433616208e36352d41e1439767aab054d36759d8b2ba4be7464e773866675b713b76e70d3c2cc987ec2e3a6d71b1d747708d045c26dd64abbaf01d4ba1b9de6ce89bab43af4658c0354c28434fb372e4017fa08ea50bc2424adbb4ab882fc8c532dc171ec45c5ccdbda39ac9975f29081b6a86569631d8ee2af14225e3e9e0d4ac6634f861a3de2049bc38e6d49b8008fd511d03115314bd7265401a264479c641735149fbac5992d4041e037550595cf2cb0ea02923aa122b534f81e546713577803d74b6a0a1f034e19a2ecf757f98f938f38ae987943535c79624d4c7e3398ed8a31326ca3f49efe657e71903ac4ea31148278e2e26d4552efbcf0ac57c915da4dda43887cac934c66fbed3ffe8eb7ca7152bb76348aab4f90e0cf8928fdb4bd5477eea75df25c8a07b19d46d9a1a0856a4dd6314a1a123589fba29925263fad0c6d066d4a6f66ea5b04042ad942badd4ff7779765820f31b8f00d95bc7b8d5452b6d6a0421665a9e16ba185edf54edd5fed93868e978ac528eed1fbaf2c2b87e73f054e077ac8986c65c91036a8dda1e743212fcecb8649993f374b6e162777f3401b6a72a4e4f339f7255129f2b584dd71e7b0748a05fc876097daa868874784380eef8fca70eae9457f919e1d59cdcca4822ae03c3eaa9b6e91f488ec632eff87602fb4f9a71358aa28dc03d96f6fa65b1cf960855b2601b38fb3535d3ff6134c707fa87c3330f2a6622275404d30609b7d8937911678efe01cce867aad898c467b7b56133923e54de83326570584a73211907a0a721d23cb6f46a6d8b94e47d54d42b20929cefd75938c67fb263a42017176c33ed6dba459e06e468d761c3f57dadaea39a1246a2f6ab89b09b103f1dde17b5fb77b4c1c68d1163d00acbc4e32b05f1e0c5a6e6bff09ee6f2734fbcca9addb99c329ca6d278167f704329756213786bbd11f48cdcd3b6e79ae2e2280dd90d88f97519f3df27921de7d2077f5cab7ad7d50653fa920d5896b2a1e30aced9c2b7d727a840d47831e9ee9e3bd1d52bebf0de5d8023809b749f417c175ff309d917b8c20fc14fb0e6f7867f1a5834515e1938ec69d0738089449238aefe016dfaa20ca32682811fac936ccb85008ab0588a93be02f1bdcd874c8160d3dc23bdef5beaa6fb28633996667bf448fb6da9eb5851808d89c945ca90b910acdd0bfb730aff85c198bee22eb567cd67315858aee22578b3dd79198dffdfe58e76eface0f65968932053ab993b650c7057ae0843f6dbb4182febaafabb8dd86160a2464fa7a3141e46a0e992e15aed44168d317f74bffae85ce72525aa9b1e2818fcdb99d09cb02d839db63f7ea070280d8567ed2eef440330bdf7767162c5b7f648851454508168d2d7a1b85b596b10670b23ca3a6460ae7ead657bac77c8aca013e818c8a932e7141705426601b8fb5b51b9a0f365f805af3394d38612eebcf166bf68a6c988a4efd9f13b1fdd16b0e28ee056e7591b51baea8a298e68f9a84f48ad6e6c4e8e57c9eacd061612b440cc5226a93ef66bec85dae0f9d40d62eebead2d4ff3be03f098b2b47b0074a871d1a403e60ace3284ebfee10972ba3ad360f920ec18039cf7a1df3601f59ab87e42de97525229fb96f7fed6ee0eabbd56e388c70fe49e0d9644e6e005583712ccdec58661704a4003e5afd9b002a3be81642da49da3621db52deafe199e820ce21d96aa8a4d7abf06d08a393ff009b0af45dbad2dd896a415c9bddf5b467c3e9a9b114e87051a077828d36688bacea927eaf1d8dd567cf11780e6b3e4ebff913e0ec39c53d5daadcfb3f7cdfced58e3d0f9346f329a687febe4c6d5b2bb681a5e199cd1974dbd1d7336ed3297fdb1c0218fbc41a83e1ef15c26332c64181ca4db8d7b249e3cb9cea1e8556f5c47922a1443c62b4e51f0f63d2c36c1e8804317bb23000b4678d027e464294c091d3913a6733f9eb5e2adf4c5160bab74664e3f4b5e1151ab8fc6169eb56f668283566e949200cde34cf915240a21954d59f2f4b8b49d741f51752b875f8ab170ce68e3ffd8da488160f60bd8c2d7ce9f17d00aefe9bccc86c31c15fb2e4778ede9740073c1ca7790e3a60ddf5a8c136494fc7a185d5e2f93f99cbec3f174b88ad92eddaf3cd150f62a19285e19026657d39812cfa51c715d8d41554e0ea60c6e800a17aa2aea5d7cf085f8215d7a374c9d5d80f16661118e21ee7ba0a9dc3d4715711000a69ea135e7df15f04ae8a58df158c2272ca3868c0c9ebd70099baed8dbd0c954ff6593ed477fa0e2c8eda7c56e008d85660d772ea459f69570c11a57fb6f000921d278b200018507be65645bd623ea06356396861f0e0fbfaf902529ed6ff68e93fb7fcdfa0e2dd07972757c9547a73ae6c8b9fcd9b8d59afefb2b694abcd1a365e1ed67cd6565c44a1405b1f576dab5a3ecb0435fa37af7d7a3d1414952a36be90aa8e49a5013c7da64496e78a1e25352691cc"}, 0x1015, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001300)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRES32=r0]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:50 executing program 0 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:50 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x31, 0x0) [ 477.754580][T32353] FAULT_INJECTION: forcing a failure. [ 477.754580][T32353] name failslab, interval 1, probability 0, space 0, times 0 [ 477.778390][T32353] CPU: 0 PID: 32353 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 477.786404][T32353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.786420][T32353] Call Trace: [ 477.799781][T32353] dump_stack+0x172/0x1f0 [ 477.804128][T32353] should_fail.cold+0xa/0x15 [ 477.808742][T32353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.808765][T32353] ? ___might_sleep+0x163/0x280 [ 477.808784][T32353] __should_failslab+0x121/0x190 [ 477.808803][T32353] should_failslab+0x9/0x14 [ 477.828911][T32353] kmem_cache_alloc_node_trace+0x270/0x720 [ 477.834820][T32353] ? lock_downgrade+0x880/0x880 [ 477.839681][T32353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.845933][T32353] __kmalloc_node+0x3d/0x70 [ 477.845952][T32353] kvmalloc_node+0x68/0x100 [ 477.845970][T32353] iov_iter_get_pages_alloc+0x862/0x1350 [ 477.845986][T32353] ? unwind_get_return_address+0x61/0xa0 [ 477.845999][T32353] ? __save_stack_trace+0x99/0x100 [ 477.846015][T32353] ? iov_iter_revert+0xaa0/0xaa0 [ 477.846029][T32353] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 477.846041][T32353] ? iov_iter_pipe+0xba/0x2f0 [ 477.846065][T32353] default_file_splice_read+0x199/0x890 [ 477.871434][T32353] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 477.886731][T32353] ? kasan_kmalloc+0x9/0x10 [ 477.886747][T32353] ? __kmalloc+0x15c/0x740 [ 477.886763][T32353] ? alloc_pipe_info+0x199/0x430 [ 477.886785][T32353] ? do_sendfile+0x597/0xd00 [ 477.902600][T32353] ? do_syscall_64+0x103/0x610 [ 477.902617][T32353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.902633][T32353] ? __lock_acquire+0x548/0x3fb0 [ 477.902654][T32353] ? iter_file_splice_write+0xbe0/0xbe0 [ 477.932336][T32353] ? percpu_ref_put_many+0x94/0x190 [ 477.932355][T32353] ? percpu_ref_put_many+0x94/0x190 [ 477.932371][T32353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.932387][T32353] ? fsnotify+0x811/0xbc0 [ 477.932406][T32353] ? fsnotify+0xbc0/0xbc0 [ 477.932420][T32353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.932436][T32353] ? fsnotify_first_mark+0x210/0x210 [ 477.932449][T32353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.932479][T32353] ? security_file_permission+0x94/0x380 [ 477.932501][T32353] ? iter_file_splice_write+0xbe0/0xbe0 [ 477.932520][T32353] do_splice_to+0x12a/0x190 [ 477.943267][T32353] splice_direct_to_actor+0x2d2/0x970 [ 477.943288][T32353] ? generic_pipe_buf_nosteal+0x10/0x10 [ 477.943306][T32353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.943320][T32353] ? do_splice_to+0x190/0x190 [ 477.943339][T32353] ? rw_verify_area+0x118/0x360 [ 477.943354][T32353] do_splice_direct+0x1da/0x2a0 [ 477.943370][T32353] ? splice_direct_to_actor+0x970/0x970 [ 477.943393][T32353] ? rw_verify_area+0x118/0x360 [ 477.943410][T32353] do_sendfile+0x597/0xd00 [ 477.943434][T32353] ? do_compat_pwritev64+0x1c0/0x1c0 [ 478.048613][T32353] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 478.048631][T32353] ? fput+0x1b/0x20 [ 478.048652][T32353] __x64_sys_sendfile64+0x1dd/0x220 [ 478.048671][T32353] ? __ia32_sys_sendfile+0x230/0x230 [ 478.048686][T32353] ? do_syscall_64+0x26/0x610 [ 478.048702][T32353] ? lockdep_hardirqs_on+0x418/0x5d0 [ 478.048722][T32353] ? trace_hardirqs_on+0x67/0x230 [ 478.058781][T32353] do_syscall_64+0x103/0x610 [ 478.058808][T32353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.094678][T32353] RIP: 0033:0x4582b9 [ 478.098586][T32353] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.118268][T32353] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 478.126684][T32353] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 478.134740][T32353] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 478.142696][T32353] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 478.150653][T32353] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 478.158624][T32353] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4800) 17:30:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x2a2002) ioctl(r0, 0x1f, &(0x7f00000003c0)="540d5749ae7bf8cd8ab96aa27465e0cc6dd038eea24c5f4356e793783b3540bab21f525a64fff473ec3b171505c9a80ad28f570dcf90db64e56cd709ac86d0ed8188bc969b7f53f54ea96da951e51e186b9c53011972445eb5c4683c5b015cd19a60379c66f2d84cbf4e0fd521d964569c2771bc495105a25e2dbf43d46824b73f9b899bc77c8b01635d8debd0ecf5bfb0112071bfddfe601d1c0d3bbbc627804b361386647e549d9ed961d22eb092d5df53292a2f1546890f37318478f889df17d3ab") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x9, 0xffffffff}, 0x2) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x4) 17:30:51 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:51 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x32, 0x0) 17:30:51 executing program 0 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 478.422399][T32375] FAULT_INJECTION: forcing a failure. [ 478.422399][T32375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 478.460881][T32375] CPU: 0 PID: 32375 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 478.468892][T32375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.478944][T32375] Call Trace: [ 478.478979][T32375] dump_stack+0x172/0x1f0 [ 478.486564][T32375] should_fail.cold+0xa/0x15 [ 478.486581][T32375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.486597][T32375] ? ___might_sleep+0x163/0x280 [ 478.486619][T32375] should_fail_alloc_page+0x50/0x60 [ 478.486633][T32375] __alloc_pages_nodemask+0x1a1/0x7e0 [ 478.486647][T32375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.486664][T32375] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 478.486678][T32375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.486701][T32375] ? __kmalloc_node+0x3d/0x70 [ 478.534930][T32375] ? rcu_read_lock_sched_held+0x110/0x130 [ 478.540664][T32375] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 478.546916][T32375] alloc_pages_current+0x107/0x210 [ 478.552034][T32375] push_pipe+0x3fc/0x7a0 [ 478.556325][T32375] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 478.561968][T32375] ? __save_stack_trace+0x99/0x100 [ 478.567111][T32375] ? iov_iter_revert+0xaa0/0xaa0 17:30:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4c00) 17:30:51 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:51 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x33, 0x0) [ 478.572072][T32375] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 478.577808][T32375] ? iov_iter_pipe+0xba/0x2f0 [ 478.583378][T32375] default_file_splice_read+0x199/0x890 [ 478.588937][T32375] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 478.594761][T32375] ? kasan_kmalloc+0x9/0x10 [ 478.599280][T32375] ? __kmalloc+0x15c/0x740 [ 478.603799][T32375] ? alloc_pipe_info+0x199/0x430 [ 478.603817][T32375] ? do_sendfile+0x597/0xd00 [ 478.603834][T32375] ? do_syscall_64+0x103/0x610 [ 478.603849][T32375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.603862][T32375] ? __lock_acquire+0x548/0x3fb0 [ 478.603877][T32375] ? iter_file_splice_write+0xbe0/0xbe0 [ 478.603898][T32375] ? percpu_ref_put_many+0x94/0x190 [ 478.603914][T32375] ? percpu_ref_put_many+0x94/0x190 [ 478.603928][T32375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.603944][T32375] ? fsnotify+0x811/0xbc0 [ 478.603964][T32375] ? fsnotify+0xbc0/0xbc0 [ 478.613475][T32375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.613495][T32375] ? fsnotify_first_mark+0x210/0x210 [ 478.613507][T32375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.613535][T32375] ? security_file_permission+0x94/0x380 [ 478.613554][T32375] ? iter_file_splice_write+0xbe0/0xbe0 [ 478.613569][T32375] do_splice_to+0x12a/0x190 [ 478.613586][T32375] splice_direct_to_actor+0x2d2/0x970 [ 478.613604][T32375] ? generic_pipe_buf_nosteal+0x10/0x10 [ 478.613622][T32375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.613636][T32375] ? do_splice_to+0x190/0x190 [ 478.613659][T32375] ? rw_verify_area+0x118/0x360 [ 478.651647][T32375] do_splice_direct+0x1da/0x2a0 [ 478.678029][T32375] ? splice_direct_to_actor+0x970/0x970 [ 478.678059][T32375] ? rw_verify_area+0x118/0x360 [ 478.678078][T32375] do_sendfile+0x597/0xd00 [ 478.678103][T32375] ? do_compat_pwritev64+0x1c0/0x1c0 [ 478.678120][T32375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 478.678135][T32375] ? fput+0x1b/0x20 [ 478.678167][T32375] __x64_sys_sendfile64+0x1dd/0x220 [ 478.678191][T32375] ? __ia32_sys_sendfile+0x230/0x230 [ 478.704820][T32375] ? do_syscall_64+0x26/0x610 [ 478.704839][T32375] ? lockdep_hardirqs_on+0x418/0x5d0 [ 478.704856][T32375] ? trace_hardirqs_on+0x67/0x230 [ 478.704874][T32375] do_syscall_64+0x103/0x610 [ 478.704894][T32375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.704905][T32375] RIP: 0033:0x4582b9 [ 478.704921][T32375] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:30:51 executing program 0 (fault-call:4 fault-nth:5): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 478.704929][T32375] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 478.704944][T32375] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 478.704963][T32375] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 478.704970][T32375] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 478.704977][T32375] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 478.704985][T32375] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6800) 17:30:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x34, 0x0) 17:30:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x102) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:30:52 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) [ 479.015582][T32500] FAULT_INJECTION: forcing a failure. [ 479.015582][T32500] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.030976][T32500] CPU: 1 PID: 32500 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 479.038978][T32500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.049037][T32500] Call Trace: [ 479.052319][T32500] dump_stack+0x172/0x1f0 [ 479.056668][T32500] should_fail.cold+0xa/0x15 [ 479.061269][T32500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.067061][T32500] ? ___might_sleep+0x163/0x280 [ 479.071901][T32500] should_fail_alloc_page+0x50/0x60 [ 479.077083][T32500] __alloc_pages_nodemask+0x1a1/0x7e0 [ 479.082440][T32500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.088232][T32500] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 479.093944][T32500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.100194][T32500] ? __kmalloc_node+0x3d/0x70 [ 479.104854][T32500] ? rcu_read_lock_sched_held+0x110/0x130 [ 479.110561][T32500] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 479.116783][T32500] alloc_pages_current+0x107/0x210 [ 479.121890][T32500] push_pipe+0x3fc/0x7a0 [ 479.126176][T32500] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 479.131799][T32500] ? __save_stack_trace+0x99/0x100 [ 479.136898][T32500] ? iov_iter_revert+0xaa0/0xaa0 [ 479.141820][T32500] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 479.147525][T32500] ? iov_iter_pipe+0xba/0x2f0 [ 479.152203][T32500] default_file_splice_read+0x199/0x890 [ 479.157752][T32500] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 479.163543][T32500] ? kasan_kmalloc+0x9/0x10 [ 479.168056][T32500] ? __kmalloc+0x15c/0x740 [ 479.172473][T32500] ? alloc_pipe_info+0x199/0x430 [ 479.177422][T32500] ? do_sendfile+0x597/0xd00 [ 479.182019][T32500] ? do_syscall_64+0x103/0x610 [ 479.186766][T32500] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.192815][T32500] ? __lock_acquire+0x548/0x3fb0 [ 479.197754][T32500] ? iter_file_splice_write+0xbe0/0xbe0 [ 479.203343][T32500] ? percpu_ref_put_many+0x94/0x190 [ 479.208526][T32500] ? percpu_ref_put_many+0x94/0x190 [ 479.213715][T32500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.219937][T32500] ? fsnotify+0x811/0xbc0 [ 479.224338][T32500] ? fsnotify+0xbc0/0xbc0 [ 479.228646][T32500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.234885][T32500] ? fsnotify_first_mark+0x210/0x210 [ 479.240172][T32500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.246760][T32500] ? security_file_permission+0x94/0x380 [ 479.252377][T32500] ? iter_file_splice_write+0xbe0/0xbe0 [ 479.257918][T32500] do_splice_to+0x12a/0x190 [ 479.262403][T32500] splice_direct_to_actor+0x2d2/0x970 [ 479.267756][T32500] ? generic_pipe_buf_nosteal+0x10/0x10 [ 479.273284][T32500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.279506][T32500] ? do_splice_to+0x190/0x190 [ 479.284174][T32500] ? rw_verify_area+0x118/0x360 [ 479.289013][T32500] do_splice_direct+0x1da/0x2a0 [ 479.293848][T32500] ? splice_direct_to_actor+0x970/0x970 [ 479.299395][T32500] ? rw_verify_area+0x118/0x360 [ 479.304255][T32500] do_sendfile+0x597/0xd00 [ 479.308661][T32500] ? do_compat_pwritev64+0x1c0/0x1c0 [ 479.313934][T32500] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 479.320162][T32500] ? fput+0x1b/0x20 [ 479.323969][T32500] __x64_sys_sendfile64+0x1dd/0x220 [ 479.329150][T32500] ? __ia32_sys_sendfile+0x230/0x230 [ 479.334429][T32500] ? do_syscall_64+0x26/0x610 [ 479.339185][T32500] ? lockdep_hardirqs_on+0x418/0x5d0 [ 479.344483][T32500] ? trace_hardirqs_on+0x67/0x230 [ 479.349492][T32500] do_syscall_64+0x103/0x610 [ 479.354086][T32500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.359972][T32500] RIP: 0033:0x4582b9 [ 479.363861][T32500] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.383451][T32500] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 479.391846][T32500] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 479.399808][T32500] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 479.407774][T32500] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 479.415742][T32500] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 479.423702][T32500] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:52 executing program 0 (fault-call:4 fault-nth:6): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6c00) 17:30:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x35, 0x0) 17:30:52 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) [ 479.690852][T32522] FAULT_INJECTION: forcing a failure. [ 479.690852][T32522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.732703][T32522] CPU: 0 PID: 32522 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 479.740734][T32522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.750800][T32522] Call Trace: [ 479.754115][T32522] dump_stack+0x172/0x1f0 [ 479.758482][T32522] should_fail.cold+0xa/0x15 [ 479.763104][T32522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.768935][T32522] ? ___might_sleep+0x163/0x280 [ 479.773812][T32522] should_fail_alloc_page+0x50/0x60 [ 479.779024][T32522] __alloc_pages_nodemask+0x1a1/0x7e0 [ 479.784403][T32522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.784422][T32522] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 479.784437][T32522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.784459][T32522] ? __kmalloc_node+0x3d/0x70 [ 479.784474][T32522] ? rcu_read_lock_sched_held+0x110/0x130 [ 479.784496][T32522] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 479.796030][T32522] alloc_pages_current+0x107/0x210 [ 479.796050][T32522] push_pipe+0x3fc/0x7a0 [ 479.796071][T32522] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 479.796089][T32522] ? __save_stack_trace+0x99/0x100 [ 479.796106][T32522] ? iov_iter_revert+0xaa0/0xaa0 [ 479.796123][T32522] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 479.796143][T32522] ? iov_iter_pipe+0xba/0x2f0 [ 479.807061][T32522] default_file_splice_read+0x199/0x890 [ 479.824100][T32522] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 479.824115][T32522] ? kasan_kmalloc+0x9/0x10 [ 479.824129][T32522] ? __kmalloc+0x15c/0x740 [ 479.824145][T32522] ? alloc_pipe_info+0x199/0x430 [ 479.824172][T32522] ? do_sendfile+0x597/0xd00 [ 479.824194][T32522] ? do_syscall_64+0x103/0x610 [ 479.824208][T32522] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.824222][T32522] ? __lock_acquire+0x548/0x3fb0 [ 479.824237][T32522] ? iter_file_splice_write+0xbe0/0xbe0 [ 479.824259][T32522] ? percpu_ref_put_many+0x94/0x190 [ 479.824279][T32522] ? percpu_ref_put_many+0x94/0x190 [ 479.839359][T32522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.839379][T32522] ? fsnotify+0x811/0xbc0 [ 479.839405][T32522] ? fsnotify+0xbc0/0xbc0 17:30:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x36, 0x0) 17:30:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7400) 17:30:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75785f69655886f5a25b99a530e2e5e5bb4e4632bf0a4e01739b275f8b9ffb0169cdf11d377e29f4347e7cb53620002d4efb7998d9946d02673b847395195851dcfa49a7eeebadfbd620d49032863528063c191a4d00e0fd74ae99da5d13c28ab7903dd9e3cbd9c44c1f88830ab65f46556d2ec18cf2abc6b99d73c234867dcecf83f51e1f346d51f52c18bc8b1a0f104082128acf5b7860721ecfcf8a046e871684bacad7c146c122d4d0e2d2612a87af23242ccb970f6c860f9e87d0114ff11d896941e47bf545", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 479.860244][T32522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.860264][T32522] ? fsnotify_first_mark+0x210/0x210 [ 479.860285][T32522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.948806][T32522] ? security_file_permission+0x94/0x380 [ 479.954460][T32522] ? iter_file_splice_write+0xbe0/0xbe0 [ 479.960032][T32522] do_splice_to+0x12a/0x190 [ 479.964679][T32522] splice_direct_to_actor+0x2d2/0x970 [ 479.970081][T32522] ? generic_pipe_buf_nosteal+0x10/0x10 [ 479.975656][T32522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.981920][T32522] ? do_splice_to+0x190/0x190 [ 479.986615][T32522] ? rw_verify_area+0x118/0x360 [ 479.991484][T32522] do_splice_direct+0x1da/0x2a0 [ 479.991504][T32522] ? splice_direct_to_actor+0x970/0x970 [ 479.991528][T32522] ? rw_verify_area+0x118/0x360 [ 479.991547][T32522] do_sendfile+0x597/0xd00 [ 479.991572][T32522] ? do_compat_pwritev64+0x1c0/0x1c0 [ 479.991595][T32522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 480.006828][T32522] ? fput+0x1b/0x20 [ 480.006854][T32522] __x64_sys_sendfile64+0x1dd/0x220 [ 480.006872][T32522] ? __ia32_sys_sendfile+0x230/0x230 [ 480.006888][T32522] ? do_syscall_64+0x26/0x610 [ 480.006903][T32522] ? lockdep_hardirqs_on+0x418/0x5d0 [ 480.006919][T32522] ? trace_hardirqs_on+0x67/0x230 [ 480.006938][T32522] do_syscall_64+0x103/0x610 [ 480.006957][T32522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.006969][T32522] RIP: 0033:0x4582b9 [ 480.006984][T32522] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.006999][T32522] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 480.052137][T32522] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 480.063124][T32522] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 480.063134][T32522] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 480.063143][T32522] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 480.063151][T32522] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7a00) 17:30:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x37, 0x0) 17:30:53 executing program 0 (fault-call:4 fault-nth:7): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x38, 0x0) [ 480.312928][T32552] FAULT_INJECTION: forcing a failure. [ 480.312928][T32552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.339969][T32552] CPU: 1 PID: 32552 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 480.347997][T32552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.358072][T32552] Call Trace: [ 480.361382][T32552] dump_stack+0x172/0x1f0 [ 480.365731][T32552] should_fail.cold+0xa/0x15 [ 480.370330][T32552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.385548][T32552] ? ___might_sleep+0x163/0x280 [ 480.390400][T32552] should_fail_alloc_page+0x50/0x60 [ 480.395587][T32552] __alloc_pages_nodemask+0x1a1/0x7e0 [ 480.400957][T32552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.406752][T32552] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 480.412460][T32552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.418710][T32552] ? __kmalloc_node+0x3d/0x70 [ 480.423397][T32552] ? rcu_read_lock_sched_held+0x110/0x130 [ 480.429135][T32552] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 480.435395][T32552] alloc_pages_current+0x107/0x210 [ 480.440512][T32552] push_pipe+0x3fc/0x7a0 [ 480.444752][T32552] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 480.451180][T32552] ? __save_stack_trace+0x99/0x100 [ 480.460123][T32552] ? iov_iter_revert+0xaa0/0xaa0 [ 480.465089][T32552] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 480.470816][T32552] ? iov_iter_pipe+0xba/0x2f0 [ 480.475512][T32552] default_file_splice_read+0x199/0x890 [ 480.481052][T32552] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 480.486848][T32552] ? kasan_kmalloc+0x9/0x10 [ 480.491344][T32552] ? __kmalloc+0x15c/0x740 [ 480.495746][T32552] ? alloc_pipe_info+0x199/0x430 [ 480.500709][T32552] ? do_sendfile+0x597/0xd00 [ 480.505302][T32552] ? do_syscall_64+0x103/0x610 [ 480.510098][T32552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.516196][T32552] ? __lock_acquire+0x548/0x3fb0 [ 480.521129][T32552] ? iter_file_splice_write+0xbe0/0xbe0 [ 480.526689][T32552] ? percpu_ref_put_many+0x94/0x190 [ 480.531879][T32552] ? percpu_ref_put_many+0x94/0x190 [ 480.537084][T32552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.543316][T32552] ? fsnotify+0x811/0xbc0 [ 480.547647][T32552] ? fsnotify+0xbc0/0xbc0 [ 480.551987][T32552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.558240][T32552] ? fsnotify_first_mark+0x210/0x210 [ 480.563536][T32552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.569796][T32552] ? security_file_permission+0x94/0x380 [ 480.576093][T32552] ? iter_file_splice_write+0xbe0/0xbe0 [ 480.581638][T32552] do_splice_to+0x12a/0x190 [ 480.586144][T32552] splice_direct_to_actor+0x2d2/0x970 [ 480.591589][T32552] ? generic_pipe_buf_nosteal+0x10/0x10 [ 480.597189][T32552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.603447][T32552] ? do_splice_to+0x190/0x190 [ 480.608125][T32552] ? rw_verify_area+0x118/0x360 [ 480.612995][T32552] do_splice_direct+0x1da/0x2a0 [ 480.617842][T32552] ? splice_direct_to_actor+0x970/0x970 [ 480.623465][T32552] ? rw_verify_area+0x118/0x360 [ 480.628328][T32552] do_sendfile+0x597/0xd00 [ 480.632761][T32552] ? do_compat_pwritev64+0x1c0/0x1c0 [ 480.638056][T32552] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 480.644308][T32552] ? fput+0x1b/0x20 [ 480.648121][T32552] __x64_sys_sendfile64+0x1dd/0x220 [ 480.653329][T32552] ? __ia32_sys_sendfile+0x230/0x230 [ 480.658622][T32552] ? do_syscall_64+0x26/0x610 [ 480.663308][T32552] ? lockdep_hardirqs_on+0x418/0x5d0 [ 480.668596][T32552] ? trace_hardirqs_on+0x67/0x230 [ 480.673628][T32552] do_syscall_64+0x103/0x610 [ 480.678215][T32552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.684119][T32552] RIP: 0033:0x4582b9 [ 480.688001][T32552] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:30:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x100000) [ 480.707694][T32552] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 480.716110][T32552] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 480.724099][T32552] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 480.732096][T32552] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 480.740060][T32552] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 480.748021][T32552] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:54 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2342a83c6fddb2cfc526b0dec9e6add44ad7098f400434af13463171c8221278deb5d08cee11", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x40008}, 0x10) 17:30:54 executing program 0 (fault-call:4 fault-nth:8): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x39, 0x0) 17:30:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x1000000) [ 481.041898][T32576] FAULT_INJECTION: forcing a failure. [ 481.041898][T32576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.078653][T32576] CPU: 0 PID: 32576 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 481.086669][T32576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.096738][T32576] Call Trace: [ 481.100049][T32576] dump_stack+0x172/0x1f0 [ 481.104402][T32576] should_fail.cold+0xa/0x15 [ 481.109008][T32576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.114857][T32576] ? ___might_sleep+0x163/0x280 [ 481.119737][T32576] should_fail_alloc_page+0x50/0x60 [ 481.124957][T32576] __alloc_pages_nodemask+0x1a1/0x7e0 [ 481.130352][T32576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.136205][T32576] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 481.141935][T32576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.148213][T32576] ? __kmalloc_node+0x3d/0x70 [ 481.152953][T32576] ? rcu_read_lock_sched_held+0x110/0x130 [ 481.158695][T32576] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 481.165050][T32576] alloc_pages_current+0x107/0x210 [ 481.170218][T32576] push_pipe+0x3fc/0x7a0 [ 481.174514][T32576] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 481.180217][T32576] ? __save_stack_trace+0x99/0x100 [ 481.185351][T32576] ? iov_iter_revert+0xaa0/0xaa0 [ 481.190333][T32576] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 481.196080][T32576] ? iov_iter_pipe+0xba/0x2f0 [ 481.200796][T32576] default_file_splice_read+0x199/0x890 [ 481.206360][T32576] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 481.212197][T32576] ? kasan_kmalloc+0x9/0x10 [ 481.216724][T32576] ? __kmalloc+0x15c/0x740 [ 481.221202][T32576] ? alloc_pipe_info+0x199/0x430 [ 481.226205][T32576] ? do_sendfile+0x597/0xd00 [ 481.230817][T32576] ? do_syscall_64+0x103/0x610 [ 481.235605][T32576] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.241692][T32576] ? __lock_acquire+0x548/0x3fb0 [ 481.246647][T32576] ? iter_file_splice_write+0xbe0/0xbe0 [ 481.252219][T32576] ? percpu_ref_put_many+0x94/0x190 [ 481.257459][T32576] ? percpu_ref_put_many+0x94/0x190 [ 481.262665][T32576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.268919][T32576] ? fsnotify+0x811/0xbc0 [ 481.273265][T32576] ? fsnotify+0xbc0/0xbc0 [ 481.277616][T32576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.283867][T32576] ? fsnotify_first_mark+0x210/0x210 17:30:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:54 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x149000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0xffffffffffff0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}], 0x1c) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="5eca8d1e93ca3ff999c3ee1d9dd542555e38802fa00ea86b97068f70ea05dc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000140)={0x3d8}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x2000000) 17:30:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3a, 0x0) 17:30:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x3000000) 17:30:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3b, 0x0) [ 481.289167][T32576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.295443][T32576] ? security_file_permission+0x94/0x380 [ 481.301085][T32576] ? iter_file_splice_write+0xbe0/0xbe0 [ 481.301101][T32576] do_splice_to+0x12a/0x190 [ 481.301118][T32576] splice_direct_to_actor+0x2d2/0x970 [ 481.301135][T32576] ? generic_pipe_buf_nosteal+0x10/0x10 [ 481.301165][T32576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.301189][T32576] ? do_splice_to+0x190/0x190 [ 481.322116][T32576] ? rw_verify_area+0x118/0x360 [ 481.322138][T32576] do_splice_direct+0x1da/0x2a0 [ 481.322165][T32576] ? splice_direct_to_actor+0x970/0x970 [ 481.322224][T32576] ? rw_verify_area+0x118/0x360 [ 481.322242][T32576] do_sendfile+0x597/0xd00 [ 481.322268][T32576] ? do_compat_pwritev64+0x1c0/0x1c0 [ 481.322286][T32576] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 481.322301][T32576] ? fput+0x1b/0x20 [ 481.322322][T32576] __x64_sys_sendfile64+0x1dd/0x220 [ 481.322340][T32576] ? __ia32_sys_sendfile+0x230/0x230 [ 481.322357][T32576] ? do_syscall_64+0x26/0x610 [ 481.322378][T32576] ? lockdep_hardirqs_on+0x418/0x5d0 [ 481.369268][T32576] ? trace_hardirqs_on+0x67/0x230 [ 481.369292][T32576] do_syscall_64+0x103/0x610 [ 481.369313][T32576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.369333][T32576] RIP: 0033:0x4582b9 [ 481.378335][T32576] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.378344][T32576] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:30:54 executing program 0 (fault-call:4 fault-nth:9): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 481.378359][T32576] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 481.378367][T32576] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 481.378382][T32576] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 481.393588][T32576] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 481.393598][T32576] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4000000) 17:30:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3c, 0x0) [ 481.612599][T32607] FAULT_INJECTION: forcing a failure. [ 481.612599][T32607] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.695918][T32607] CPU: 1 PID: 32607 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 481.703964][T32607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.714039][T32607] Call Trace: [ 481.717362][T32607] dump_stack+0x172/0x1f0 [ 481.721727][T32607] should_fail.cold+0xa/0x15 [ 481.726349][T32607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.732192][T32607] ? ___might_sleep+0x163/0x280 [ 481.737073][T32607] should_fail_alloc_page+0x50/0x60 17:30:54 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fa5b412c4a12ac512c077830630ac7f392cb2229a371e2c65a1297ca15c1862d41560831b680cbc8bf7e4cdfc0b691519f15fd0eff85f599c267c4d1cfd8e5f2510759f41d5f863fd812ec86cea3c597b1d02ff3c6bb1e9e25a4d0fdfd1e09"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x3b65, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 481.742319][T32607] __alloc_pages_nodemask+0x1a1/0x7e0 [ 481.747723][T32607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.753557][T32607] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 481.759303][T32607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.765650][T32607] ? __kmalloc_node+0x3d/0x70 [ 481.770342][T32607] ? rcu_read_lock_sched_held+0x110/0x130 [ 481.776057][T32607] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 481.782335][T32607] alloc_pages_current+0x107/0x210 [ 481.787466][T32607] push_pipe+0x3fc/0x7a0 [ 481.791726][T32607] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 481.797358][T32607] ? __save_stack_trace+0x99/0x100 [ 481.802492][T32607] ? iov_iter_revert+0xaa0/0xaa0 [ 481.807427][T32607] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 481.813175][T32607] ? iov_iter_pipe+0xba/0x2f0 [ 481.817873][T32607] default_file_splice_read+0x199/0x890 [ 481.823533][T32607] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 481.829375][T32607] ? kasan_kmalloc+0x9/0x10 [ 481.833891][T32607] ? __kmalloc+0x15c/0x740 [ 481.838319][T32607] ? alloc_pipe_info+0x199/0x430 [ 481.843367][T32607] ? do_sendfile+0x597/0xd00 [ 481.847963][T32607] ? do_syscall_64+0x103/0x610 [ 481.852716][T32607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.858793][T32607] ? __lock_acquire+0x548/0x3fb0 [ 481.863736][T32607] ? iter_file_splice_write+0xbe0/0xbe0 [ 481.869293][T32607] ? percpu_ref_put_many+0x94/0x190 [ 481.874486][T32607] ? percpu_ref_put_many+0x94/0x190 [ 481.879688][T32607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.885931][T32607] ? fsnotify+0x811/0xbc0 [ 481.890259][T32607] ? fsnotify+0xbc0/0xbc0 [ 481.894932][T32607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.901187][T32607] ? fsnotify_first_mark+0x210/0x210 [ 481.906483][T32607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.912751][T32607] ? security_file_permission+0x94/0x380 [ 481.918401][T32607] ? iter_file_splice_write+0xbe0/0xbe0 [ 481.923960][T32607] do_splice_to+0x12a/0x190 [ 481.928485][T32607] splice_direct_to_actor+0x2d2/0x970 [ 481.933868][T32607] ? generic_pipe_buf_nosteal+0x10/0x10 [ 481.939475][T32607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.945753][T32607] ? do_splice_to+0x190/0x190 [ 481.950436][T32607] ? rw_verify_area+0x118/0x360 [ 481.955288][T32607] do_splice_direct+0x1da/0x2a0 [ 481.960183][T32607] ? splice_direct_to_actor+0x970/0x970 [ 481.965766][T32607] ? rw_verify_area+0x118/0x360 [ 481.970611][T32607] do_sendfile+0x597/0xd00 [ 481.975042][T32607] ? do_compat_pwritev64+0x1c0/0x1c0 [ 481.980322][T32607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 481.986548][T32607] ? fput+0x1b/0x20 [ 481.990358][T32607] __x64_sys_sendfile64+0x1dd/0x220 [ 481.995562][T32607] ? __ia32_sys_sendfile+0x230/0x230 [ 482.000830][T32607] ? do_syscall_64+0x26/0x610 [ 482.005500][T32607] ? lockdep_hardirqs_on+0x418/0x5d0 [ 482.010785][T32607] ? trace_hardirqs_on+0x67/0x230 [ 482.015829][T32607] do_syscall_64+0x103/0x610 [ 482.020851][T32607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.026743][T32607] RIP: 0033:0x4582b9 [ 482.030634][T32607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.050437][T32607] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 482.058863][T32607] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 482.066851][T32607] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 482.074832][T32607] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 482.082798][T32607] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 17:30:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 482.090778][T32607] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3d, 0x0) 17:30:55 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x5000000) 17:30:55 executing program 0 (fault-call:4 fault-nth:10): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3e, 0x0) [ 482.435574][T32639] FAULT_INJECTION: forcing a failure. [ 482.435574][T32639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.454423][T32639] CPU: 0 PID: 32639 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 482.462462][T32639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.472540][T32639] Call Trace: [ 482.475858][T32639] dump_stack+0x172/0x1f0 [ 482.480228][T32639] should_fail.cold+0xa/0x15 [ 482.484832][T32639] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.490650][T32639] ? ___might_sleep+0x163/0x280 [ 482.495534][T32639] should_fail_alloc_page+0x50/0x60 [ 482.500770][T32639] __alloc_pages_nodemask+0x1a1/0x7e0 [ 482.506948][T32639] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.512777][T32639] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 482.518512][T32639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.524789][T32639] ? __kmalloc_node+0x3d/0x70 [ 482.529568][T32639] ? rcu_read_lock_sched_held+0x110/0x130 [ 482.535302][T32639] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 482.541563][T32639] alloc_pages_current+0x107/0x210 [ 482.546706][T32639] push_pipe+0x3fc/0x7a0 [ 482.550977][T32639] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 482.556644][T32639] ? __save_stack_trace+0x99/0x100 [ 482.561778][T32639] ? iov_iter_revert+0xaa0/0xaa0 [ 482.566746][T32639] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 482.572598][T32639] ? iov_iter_pipe+0xba/0x2f0 [ 482.577294][T32639] default_file_splice_read+0x199/0x890 [ 482.583847][T32639] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 482.589671][T32639] ? kasan_kmalloc+0x9/0x10 [ 482.594196][T32639] ? __kmalloc+0x15c/0x740 [ 482.598622][T32639] ? alloc_pipe_info+0x199/0x430 [ 482.603677][T32639] ? do_sendfile+0x597/0xd00 [ 482.608301][T32639] ? do_syscall_64+0x103/0x610 [ 482.613078][T32639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.619194][T32639] ? iter_file_splice_write+0xbe0/0xbe0 [ 482.624767][T32639] ? __lockdep_free_key_range+0x120/0x120 [ 482.630505][T32639] ? percpu_ref_put_many+0x94/0x190 [ 482.635728][T32639] ? percpu_ref_put_many+0x94/0x190 [ 482.640937][T32639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.647213][T32639] ? fsnotify+0x811/0xbc0 [ 482.651572][T32639] ? fsnotify+0xbc0/0xbc0 [ 482.655915][T32639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.662276][T32639] ? fsnotify_first_mark+0x210/0x210 [ 482.667567][T32639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.673832][T32639] ? security_file_permission+0x94/0x380 [ 482.679481][T32639] ? iter_file_splice_write+0xbe0/0xbe0 [ 482.685034][T32639] do_splice_to+0x12a/0x190 [ 482.689551][T32639] splice_direct_to_actor+0x2d2/0x970 [ 482.695050][T32639] ? generic_pipe_buf_nosteal+0x10/0x10 [ 482.700618][T32639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.706978][T32639] ? do_splice_to+0x190/0x190 [ 482.711694][T32639] ? rw_verify_area+0x118/0x360 [ 482.716568][T32639] do_splice_direct+0x1da/0x2a0 [ 482.721523][T32639] ? splice_direct_to_actor+0x970/0x970 [ 482.727099][T32639] ? rw_verify_area+0x118/0x360 [ 482.731991][T32639] do_sendfile+0x597/0xd00 [ 482.736456][T32639] ? do_compat_pwritev64+0x1c0/0x1c0 [ 482.741753][T32639] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 482.748011][T32639] ? fput+0x1b/0x20 [ 482.751832][T32639] __x64_sys_sendfile64+0x1dd/0x220 [ 482.757052][T32639] ? __ia32_sys_sendfile+0x230/0x230 [ 482.762360][T32639] ? do_syscall_64+0x26/0x610 [ 482.767048][T32639] ? lockdep_hardirqs_on+0x418/0x5d0 [ 482.772353][T32639] ? trace_hardirqs_on+0x67/0x230 [ 482.777515][T32639] do_syscall_64+0x103/0x610 [ 482.782312][T32639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.788327][T32639] RIP: 0033:0x4582b9 [ 482.792253][T32639] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.813519][T32639] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 482.822304][T32639] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 17:30:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6000000) [ 482.830823][T32639] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 482.838816][T32639] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 482.847265][T32639] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 482.856059][T32639] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c11"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:56 executing program 0 (fault-call:4 fault-nth:11): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x41, 0x0) 17:30:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7000000) 17:30:56 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 483.130969][T32657] FAULT_INJECTION: forcing a failure. [ 483.130969][T32657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.170539][T32657] CPU: 1 PID: 32657 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 17:30:56 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d15d64569a65cf6cf72ded085ca7d356553bd1e70ac9fa9aa9daa48b976b2ae008a90b5b9e58d6a2881783bc4d7c581b6edf570e4c2adcf5c3b0527ee87888f563f36f4de39e8057e59914600284cf5727488033d35b700f801f7b6f7d48dbe529358782d2a7f56aa69", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 483.178832][T32657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.188906][T32657] Call Trace: [ 483.192312][T32657] dump_stack+0x172/0x1f0 [ 483.196691][T32657] should_fail.cold+0xa/0x15 [ 483.201329][T32657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.207174][T32657] ? ___might_sleep+0x163/0x280 [ 483.212087][T32657] should_fail_alloc_page+0x50/0x60 [ 483.217323][T32657] __alloc_pages_nodemask+0x1a1/0x7e0 [ 483.222730][T32657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.228559][T32657] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 483.234274][T32657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.240525][T32657] ? __kmalloc_node+0x3d/0x70 [ 483.245217][T32657] ? rcu_read_lock_sched_held+0x110/0x130 [ 483.250961][T32657] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 483.257217][T32657] alloc_pages_current+0x107/0x210 [ 483.262344][T32657] push_pipe+0x3fc/0x7a0 [ 483.266596][T32657] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 483.272244][T32657] ? __save_stack_trace+0x99/0x100 [ 483.277356][T32657] ? iov_iter_revert+0xaa0/0xaa0 [ 483.282297][T32657] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 483.288016][T32657] ? iov_iter_pipe+0xba/0x2f0 [ 483.292725][T32657] default_file_splice_read+0x199/0x890 [ 483.298286][T32657] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 483.304139][T32657] ? kasan_kmalloc+0x9/0x10 [ 483.308702][T32657] ? __kmalloc+0x15c/0x740 [ 483.313118][T32657] ? alloc_pipe_info+0x199/0x430 [ 483.318068][T32657] ? do_sendfile+0x597/0xd00 [ 483.322651][T32657] ? do_syscall_64+0x103/0x610 [ 483.327505][T32657] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.333583][T32657] ? __lock_acquire+0x548/0x3fb0 [ 483.338698][T32657] ? iter_file_splice_write+0xbe0/0xbe0 [ 483.344249][T32657] ? percpu_ref_put_many+0x94/0x190 [ 483.349542][T32657] ? percpu_ref_put_many+0x94/0x190 [ 483.354737][T32657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.360974][T32657] ? fsnotify+0x811/0xbc0 [ 483.365312][T32657] ? fsnotify+0xbc0/0xbc0 [ 483.369642][T32657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.375925][T32657] ? fsnotify_first_mark+0x210/0x210 [ 483.383020][T32657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.389531][T32657] ? security_file_permission+0x94/0x380 [ 483.395178][T32657] ? iter_file_splice_write+0xbe0/0xbe0 [ 483.400738][T32657] do_splice_to+0x12a/0x190 [ 483.405272][T32657] splice_direct_to_actor+0x2d2/0x970 [ 483.410653][T32657] ? generic_pipe_buf_nosteal+0x10/0x10 [ 483.416219][T32657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.422460][T32657] ? do_splice_to+0x190/0x190 [ 483.427144][T32657] ? rw_verify_area+0x118/0x360 [ 483.432041][T32657] do_splice_direct+0x1da/0x2a0 [ 483.436920][T32657] ? splice_direct_to_actor+0x970/0x970 [ 483.442489][T32657] ? rw_verify_area+0x118/0x360 [ 483.447419][T32657] do_sendfile+0x597/0xd00 [ 483.451861][T32657] ? do_compat_pwritev64+0x1c0/0x1c0 [ 483.457185][T32657] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 483.463602][T32657] ? fput+0x1b/0x20 [ 483.467413][T32657] __x64_sys_sendfile64+0x1dd/0x220 [ 483.472625][T32657] ? __ia32_sys_sendfile+0x230/0x230 [ 483.477912][T32657] ? do_syscall_64+0x26/0x610 [ 483.482714][T32657] ? lockdep_hardirqs_on+0x418/0x5d0 [ 483.488056][T32657] ? trace_hardirqs_on+0x67/0x230 [ 483.493200][T32657] do_syscall_64+0x103/0x610 [ 483.497814][T32657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.505312][T32657] RIP: 0033:0x4582b9 [ 483.509250][T32657] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.529042][T32657] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 483.537482][T32657] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 483.545471][T32657] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 483.553444][T32657] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 483.562752][T32657] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 483.573179][T32657] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x42, 0x0) 17:30:56 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x9000000) 17:30:56 executing program 0 (fault-call:4 fault-nth:12): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0xa000000) 17:30:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x43, 0x0) [ 483.840915][T32682] FAULT_INJECTION: forcing a failure. [ 483.840915][T32682] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.870526][T32682] CPU: 0 PID: 32682 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 483.878554][T32682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.888622][T32682] Call Trace: [ 483.891944][T32682] dump_stack+0x172/0x1f0 [ 483.896300][T32682] should_fail.cold+0xa/0x15 [ 483.900926][T32682] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.906757][T32682] ? ___might_sleep+0x163/0x280 [ 483.911629][T32682] should_fail_alloc_page+0x50/0x60 [ 483.916842][T32682] __alloc_pages_nodemask+0x1a1/0x7e0 [ 483.916859][T32682] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.916874][T32682] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 483.916888][T32682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.916906][T32682] ? __kmalloc_node+0x3d/0x70 [ 483.916922][T32682] ? rcu_read_lock_sched_held+0x110/0x130 [ 483.916935][T32682] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 483.916955][T32682] alloc_pages_current+0x107/0x210 [ 483.961901][T32682] push_pipe+0x3fc/0x7a0 [ 483.966189][T32682] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 483.971850][T32682] ? __save_stack_trace+0x99/0x100 [ 483.976988][T32682] ? iov_iter_revert+0xaa0/0xaa0 [ 483.981970][T32682] ? __sanitizer_cov_trace_cmp4+0x16/0x20 17:30:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x48000000) [ 483.987820][T32682] ? iov_iter_pipe+0xba/0x2f0 [ 483.992543][T32682] default_file_splice_read+0x199/0x890 [ 483.998112][T32682] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 484.003952][T32682] ? kasan_kmalloc+0x9/0x10 [ 484.008501][T32682] ? __kmalloc+0x15c/0x740 [ 484.012952][T32682] ? alloc_pipe_info+0x199/0x430 [ 484.017908][T32682] ? do_sendfile+0x597/0xd00 [ 484.022524][T32682] ? do_syscall_64+0x103/0x610 [ 484.027300][T32682] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.033384][T32682] ? __lock_acquire+0x548/0x3fb0 17:30:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x44, 0x0) [ 484.038339][T32682] ? iter_file_splice_write+0xbe0/0xbe0 [ 484.043906][T32682] ? percpu_ref_put_many+0x94/0x190 [ 484.049123][T32682] ? percpu_ref_put_many+0x94/0x190 [ 484.054350][T32682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.060616][T32682] ? fsnotify+0x811/0xbc0 [ 484.064970][T32682] ? fsnotify+0xbc0/0xbc0 [ 484.069320][T32682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.075577][T32682] ? fsnotify_first_mark+0x210/0x210 [ 484.080907][T32682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:30:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4c000000) [ 484.087191][T32682] ? security_file_permission+0x94/0x380 [ 484.092841][T32682] ? iter_file_splice_write+0xbe0/0xbe0 [ 484.098397][T32682] do_splice_to+0x12a/0x190 [ 484.102912][T32682] splice_direct_to_actor+0x2d2/0x970 [ 484.108302][T32682] ? generic_pipe_buf_nosteal+0x10/0x10 [ 484.113870][T32682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.120171][T32682] ? do_splice_to+0x190/0x190 [ 484.124964][T32682] ? rw_verify_area+0x118/0x360 [ 484.129833][T32682] do_splice_direct+0x1da/0x2a0 [ 484.134706][T32682] ? splice_direct_to_actor+0x970/0x970 [ 484.140486][T32682] ? rw_verify_area+0x118/0x360 [ 484.145361][T32682] do_sendfile+0x597/0xd00 [ 484.149798][T32682] ? do_compat_pwritev64+0x1c0/0x1c0 [ 484.155101][T32682] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 484.161398][T32682] ? fput+0x1b/0x20 [ 484.165230][T32682] __x64_sys_sendfile64+0x1dd/0x220 [ 484.170450][T32682] ? __ia32_sys_sendfile+0x230/0x230 [ 484.175748][T32682] ? do_syscall_64+0x26/0x610 [ 484.180488][T32682] ? lockdep_hardirqs_on+0x418/0x5d0 [ 484.185802][T32682] ? trace_hardirqs_on+0x67/0x230 17:30:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x45, 0x0) [ 484.190875][T32682] do_syscall_64+0x103/0x610 [ 484.195483][T32682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.201406][T32682] RIP: 0033:0x4582b9 [ 484.205310][T32682] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.224924][T32682] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 484.233349][T32682] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 484.233359][T32682] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 484.233366][T32682] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 484.233374][T32682] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 484.233381][T32682] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:57 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:57 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x68000000) 17:30:57 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:57 executing program 0 (fault-call:4 fault-nth:13): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x46, 0x0) 17:30:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6c000000) [ 484.677126][T32721] FAULT_INJECTION: forcing a failure. [ 484.677126][T32721] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 484.700685][T32721] CPU: 0 PID: 32721 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 484.708712][T32721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.718801][T32721] Call Trace: [ 484.722121][T32721] dump_stack+0x172/0x1f0 [ 484.726484][T32721] should_fail.cold+0xa/0x15 [ 484.731081][T32721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.736889][T32721] ? ___might_sleep+0x163/0x280 [ 484.741764][T32721] should_fail_alloc_page+0x50/0x60 [ 484.746980][T32721] __alloc_pages_nodemask+0x1a1/0x7e0 [ 484.752371][T32721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.758381][T32721] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 484.764130][T32721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.770757][T32721] ? __kmalloc_node+0x3d/0x70 [ 484.775461][T32721] ? rcu_read_lock_sched_held+0x110/0x130 [ 484.781212][T32721] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 484.787496][T32721] alloc_pages_current+0x107/0x210 [ 484.792634][T32721] push_pipe+0x3fc/0x7a0 [ 484.796902][T32721] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 484.796920][T32721] ? __save_stack_trace+0x99/0x100 [ 484.796935][T32721] ? iov_iter_revert+0xaa0/0xaa0 [ 484.796950][T32721] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 484.796961][T32721] ? iov_iter_pipe+0xba/0x2f0 [ 484.796980][T32721] default_file_splice_read+0x199/0x890 [ 484.796996][T32721] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 484.797008][T32721] ? kasan_kmalloc+0x9/0x10 [ 484.797020][T32721] ? __kmalloc+0x15c/0x740 [ 484.797036][T32721] ? alloc_pipe_info+0x199/0x430 [ 484.797050][T32721] ? do_sendfile+0x597/0xd00 [ 484.797067][T32721] ? do_syscall_64+0x103/0x610 [ 484.797089][T32721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.812761][T32721] ? __lock_acquire+0x548/0x3fb0 [ 484.868786][T32721] ? iter_file_splice_write+0xbe0/0xbe0 [ 484.874342][T32721] ? percpu_ref_put_many+0x94/0x190 [ 484.879553][T32721] ? percpu_ref_put_many+0x94/0x190 [ 484.884774][T32721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.891028][T32721] ? fsnotify+0x811/0xbc0 [ 484.895462][T32721] ? fsnotify+0xbc0/0xbc0 [ 484.899786][T32721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.906057][T32721] ? fsnotify_first_mark+0x210/0x210 [ 484.911361][T32721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.917607][T32721] ? security_file_permission+0x94/0x380 [ 484.923247][T32721] ? iter_file_splice_write+0xbe0/0xbe0 [ 484.928810][T32721] do_splice_to+0x12a/0x190 [ 484.933336][T32721] splice_direct_to_actor+0x2d2/0x970 [ 484.938704][T32721] ? generic_pipe_buf_nosteal+0x10/0x10 [ 484.944260][T32721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.950518][T32721] ? do_splice_to+0x190/0x190 [ 484.955200][T32721] ? rw_verify_area+0x118/0x360 [ 484.960058][T32721] do_splice_direct+0x1da/0x2a0 [ 484.964906][T32721] ? splice_direct_to_actor+0x970/0x970 [ 484.970481][T32721] ? rw_verify_area+0x118/0x360 [ 484.975325][T32721] do_sendfile+0x597/0xd00 [ 484.979875][T32721] ? do_compat_pwritev64+0x1c0/0x1c0 [ 484.985185][T32721] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 484.991423][T32721] ? fput+0x1b/0x20 [ 484.995219][T32721] __x64_sys_sendfile64+0x1dd/0x220 [ 485.000408][T32721] ? __ia32_sys_sendfile+0x230/0x230 [ 485.005693][T32721] ? do_syscall_64+0x26/0x610 [ 485.010374][T32721] ? lockdep_hardirqs_on+0x418/0x5d0 [ 485.015656][T32721] ? trace_hardirqs_on+0x67/0x230 [ 485.020675][T32721] do_syscall_64+0x103/0x610 [ 485.025275][T32721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.031173][T32721] RIP: 0033:0x4582b9 [ 485.035076][T32721] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.054667][T32721] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 485.063066][T32721] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 485.071028][T32721] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:30:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x74000000) 17:30:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x47, 0x0) 17:30:58 executing program 0 (fault-call:4 fault-nth:14): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 485.079029][T32721] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 485.095227][T32721] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 485.103210][T32721] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x48, 0x0) 17:30:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7a000000) [ 485.257973][T32737] FAULT_INJECTION: forcing a failure. [ 485.257973][T32737] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.299115][T32737] CPU: 0 PID: 32737 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 485.307154][T32737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.317247][T32737] Call Trace: [ 485.320563][T32737] dump_stack+0x172/0x1f0 [ 485.324917][T32737] should_fail.cold+0xa/0x15 [ 485.329535][T32737] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.335374][T32737] ? ___might_sleep+0x163/0x280 [ 485.340252][T32737] should_fail_alloc_page+0x50/0x60 [ 485.345484][T32737] __alloc_pages_nodemask+0x1a1/0x7e0 [ 485.351015][T32737] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.356847][T32737] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 485.362590][T32737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.368869][T32737] ? __kmalloc_node+0x3d/0x70 [ 485.373566][T32737] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.379306][T32737] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 485.385576][T32737] alloc_pages_current+0x107/0x210 [ 485.390727][T32737] push_pipe+0x3fc/0x7a0 [ 485.395002][T32737] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 485.400657][T32737] ? __save_stack_trace+0x99/0x100 [ 485.405802][T32737] ? iov_iter_revert+0xaa0/0xaa0 [ 485.410770][T32737] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 485.416515][T32737] ? iov_iter_pipe+0xba/0x2f0 [ 485.421223][T32737] default_file_splice_read+0x199/0x890 [ 485.426816][T32737] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 485.432735][T32737] ? kasan_kmalloc+0x9/0x10 [ 485.432758][T32737] ? __kmalloc+0x15c/0x740 [ 485.441688][T32737] ? alloc_pipe_info+0x199/0x430 [ 485.441708][T32737] ? do_sendfile+0x597/0xd00 [ 485.441726][T32737] ? do_syscall_64+0x103/0x610 [ 485.441742][T32737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.441758][T32737] ? __lock_acquire+0x548/0x3fb0 [ 485.441776][T32737] ? iter_file_splice_write+0xbe0/0xbe0 [ 485.441798][T32737] ? percpu_ref_put_many+0x94/0x190 [ 485.478842][T32737] ? percpu_ref_put_many+0x94/0x190 [ 485.484170][T32737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.490530][T32737] ? fsnotify+0x811/0xbc0 [ 485.494881][T32737] ? fsnotify+0xbc0/0xbc0 [ 485.499220][T32737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.505460][T32737] ? fsnotify_first_mark+0x210/0x210 [ 485.510854][T32737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.517133][T32737] ? security_file_permission+0x94/0x380 [ 485.522789][T32737] ? iter_file_splice_write+0xbe0/0xbe0 [ 485.528331][T32737] do_splice_to+0x12a/0x190 [ 485.532834][T32737] splice_direct_to_actor+0x2d2/0x970 [ 485.538218][T32737] ? generic_pipe_buf_nosteal+0x10/0x10 [ 485.544114][T32737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.551211][T32737] ? do_splice_to+0x190/0x190 [ 485.555901][T32737] ? rw_verify_area+0x118/0x360 [ 485.561129][T32737] do_splice_direct+0x1da/0x2a0 [ 485.566002][T32737] ? splice_direct_to_actor+0x970/0x970 [ 485.571590][T32737] ? rw_verify_area+0x118/0x360 [ 485.576459][T32737] do_sendfile+0x597/0xd00 [ 485.581008][T32737] ? do_compat_pwritev64+0x1c0/0x1c0 [ 485.586325][T32737] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 485.592591][T32737] ? fput+0x1b/0x20 [ 485.596586][T32737] __x64_sys_sendfile64+0x1dd/0x220 [ 485.602458][T32737] ? __ia32_sys_sendfile+0x230/0x230 [ 485.608391][T32737] ? do_syscall_64+0x26/0x610 [ 485.613081][T32737] ? lockdep_hardirqs_on+0x418/0x5d0 [ 485.618370][T32737] ? trace_hardirqs_on+0x67/0x230 [ 485.623401][T32737] do_syscall_64+0x103/0x610 [ 485.627992][T32737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.633871][T32737] RIP: 0033:0x4582b9 [ 485.637748][T32737] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.657611][T32737] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 485.666026][T32737] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 485.674008][T32737] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 485.681971][T32737] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 485.689958][T32737] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 485.697927][T32737] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:58 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x10000000000000) 17:30:58 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x49, 0x0) 17:30:58 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101, 0x20) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x4}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:30:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x100000000000000) 17:30:59 executing program 0 (fault-call:4 fault-nth:15): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4a, 0x0) 17:30:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) [ 486.004321][T32767] FAULT_INJECTION: forcing a failure. [ 486.004321][T32767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.036186][T32767] CPU: 1 PID: 32767 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 486.044299][T32767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.054381][T32767] Call Trace: [ 486.057710][T32767] dump_stack+0x172/0x1f0 [ 486.062077][T32767] should_fail.cold+0xa/0x15 [ 486.066706][T32767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.072526][T32767] ? ___might_sleep+0x163/0x280 [ 486.077430][T32767] should_fail_alloc_page+0x50/0x60 [ 486.083223][T32767] __alloc_pages_nodemask+0x1a1/0x7e0 [ 486.089132][T32767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.095222][T32767] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 486.101200][T32767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.107453][T32767] ? __kmalloc_node+0x3d/0x70 [ 486.112144][T32767] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.117893][T32767] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 486.124136][T32767] alloc_pages_current+0x107/0x210 [ 486.129257][T32767] push_pipe+0x3fc/0x7a0 [ 486.133517][T32767] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 486.139190][T32767] ? __save_stack_trace+0x99/0x100 [ 486.144345][T32767] ? iov_iter_revert+0xaa0/0xaa0 [ 486.149318][T32767] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 486.155068][T32767] ? iov_iter_pipe+0xba/0x2f0 [ 486.159749][T32767] default_file_splice_read+0x199/0x890 [ 486.165446][T32767] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 486.171265][T32767] ? kasan_kmalloc+0x9/0x10 [ 486.175780][T32767] ? __kmalloc+0x15c/0x740 [ 486.180216][T32767] ? alloc_pipe_info+0x199/0x430 [ 486.185168][T32767] ? do_sendfile+0x597/0xd00 [ 486.189774][T32767] ? do_syscall_64+0x103/0x610 [ 486.194563][T32767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.200653][T32767] ? __lock_acquire+0x548/0x3fb0 [ 486.205737][T32767] ? iter_file_splice_write+0xbe0/0xbe0 [ 486.211315][T32767] ? percpu_ref_put_many+0x94/0x190 [ 486.216515][T32767] ? percpu_ref_put_many+0x94/0x190 [ 486.221758][T32767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.228245][T32767] ? fsnotify+0x811/0xbc0 [ 486.232595][T32767] ? fsnotify+0xbc0/0xbc0 [ 486.236927][T32767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.243198][T32767] ? fsnotify_first_mark+0x210/0x210 [ 486.248515][T32767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.254780][T32767] ? security_file_permission+0x94/0x380 [ 486.260432][T32767] ? iter_file_splice_write+0xbe0/0xbe0 [ 486.265982][T32767] do_splice_to+0x12a/0x190 [ 486.270510][T32767] splice_direct_to_actor+0x2d2/0x970 [ 486.275896][T32767] ? generic_pipe_buf_nosteal+0x10/0x10 [ 486.281481][T32767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.287738][T32767] ? do_splice_to+0x190/0x190 [ 486.292414][T32767] ? rw_verify_area+0x118/0x360 [ 486.297366][T32767] do_splice_direct+0x1da/0x2a0 [ 486.302250][T32767] ? splice_direct_to_actor+0x970/0x970 [ 486.307838][T32767] ? rw_verify_area+0x118/0x360 [ 486.312714][T32767] do_sendfile+0x597/0xd00 [ 486.317172][T32767] ? do_compat_pwritev64+0x1c0/0x1c0 [ 486.322469][T32767] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 486.328983][T32767] ? fput+0x1b/0x20 [ 486.332817][T32767] __x64_sys_sendfile64+0x1dd/0x220 [ 486.338042][T32767] ? __ia32_sys_sendfile+0x230/0x230 [ 486.343358][T32767] ? do_syscall_64+0x26/0x610 [ 486.348065][T32767] ? lockdep_hardirqs_on+0x418/0x5d0 [ 486.353720][T32767] ? trace_hardirqs_on+0x67/0x230 [ 486.358751][T32767] do_syscall_64+0x103/0x610 [ 486.363533][T32767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.369479][T32767] RIP: 0033:0x4582b9 [ 486.374596][T32767] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.394622][T32767] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 486.418198][T32767] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 486.426174][T32767] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 486.434146][T32767] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:30:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 486.442235][T32767] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 486.457125][T32767] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:30:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x200000000000000) 17:30:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4b, 0x0) 17:30:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:30:59 executing program 0 (fault-call:4 fault-nth:16): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:30:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x300000000000000) 17:30:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) 17:30:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4c, 0x0) 17:30:59 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x12, 0x6, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x3, &(0x7f00000002c0)=0xfff, 0xd5) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = accept(r1, &(0x7f0000000300)=@in={0x2, 0x0, @loopback}, &(0x7f0000000380)=0x80) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000003c0)={r2, 0x54, "3adabd683ed6d7653a6d765b4e3f39d1c1b59634243475cb7c7ad7648c402ff2273c7869837b4035dc57ca9e206d622af545f88219850742f9798698ce64700b91a25025c351f1a318936e11a57c97bb7e1b342b"}, &(0x7f0000000440)=0x5c) read$FUSE(r0, &(0x7f0000001640), 0x1000) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x800, 0x0) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000640)={0x8, 0x9, 0x1, 0x9, 0x13, 0x7fffffff, 0x20, 0x8, 0x100000000, 0x6}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000680)=0x0) ptrace$peekuser(0x3, r5, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000240)={0x3f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'lblcr\x00', 0x4, 0x6, 0x47}, 0x2c) [ 486.895225][ T332] FAULT_INJECTION: forcing a failure. [ 486.895225][ T332] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.946987][ T332] CPU: 0 PID: 332 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 486.954846][ T332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.964917][ T332] Call Trace: [ 486.968314][ T332] dump_stack+0x172/0x1f0 [ 486.972671][ T332] should_fail.cold+0xa/0x15 [ 486.977287][ T332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.983121][ T332] ? ___might_sleep+0x163/0x280 [ 486.988030][ T332] should_fail_alloc_page+0x50/0x60 [ 486.993256][ T332] __alloc_pages_nodemask+0x1a1/0x7e0 [ 486.998656][ T332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.004519][ T332] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 487.010358][ T332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.016637][ T332] ? __kmalloc_node+0x3d/0x70 [ 487.021342][ T332] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.027082][ T332] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 487.033360][ T332] alloc_pages_current+0x107/0x210 [ 487.038581][ T332] push_pipe+0x3fc/0x7a0 17:31:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 487.042848][ T332] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 487.048511][ T332] ? __save_stack_trace+0x99/0x100 [ 487.053645][ T332] ? iov_iter_revert+0xaa0/0xaa0 [ 487.058697][ T332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 487.064443][ T332] ? iov_iter_pipe+0xba/0x2f0 [ 487.069144][ T332] default_file_splice_read+0x199/0x890 [ 487.074913][ T332] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 487.080824][ T332] ? kasan_kmalloc+0x9/0x10 [ 487.085610][ T332] ? __kmalloc+0x15c/0x740 [ 487.090236][ T332] ? alloc_pipe_info+0x199/0x430 [ 487.095213][ T332] ? do_sendfile+0x597/0xd00 [ 487.095231][ T332] ? do_syscall_64+0x103/0x610 [ 487.095246][ T332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.095260][ T332] ? __lock_acquire+0x548/0x3fb0 [ 487.095276][ T332] ? iter_file_splice_write+0xbe0/0xbe0 [ 487.095298][ T332] ? percpu_ref_put_many+0x94/0x190 [ 487.095315][ T332] ? percpu_ref_put_many+0x94/0x190 [ 487.095330][ T332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.095345][ T332] ? fsnotify+0x811/0xbc0 [ 487.095364][ T332] ? fsnotify+0xbc0/0xbc0 [ 487.095378][ T332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.095401][ T332] ? fsnotify_first_mark+0x210/0x210 [ 487.121657][ T332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.121689][ T332] ? security_file_permission+0x94/0x380 [ 487.121717][ T332] ? iter_file_splice_write+0xbe0/0xbe0 [ 487.176048][ T332] do_splice_to+0x12a/0x190 [ 487.180662][ T332] splice_direct_to_actor+0x2d2/0x970 [ 487.186059][ T332] ? generic_pipe_buf_nosteal+0x10/0x10 [ 487.191620][ T332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.197874][ T332] ? do_splice_to+0x190/0x190 [ 487.202576][ T332] ? rw_verify_area+0x118/0x360 [ 487.207640][ T332] do_splice_direct+0x1da/0x2a0 [ 487.212531][ T332] ? splice_direct_to_actor+0x970/0x970 [ 487.218207][ T332] ? rw_verify_area+0x118/0x360 [ 487.223260][ T332] do_sendfile+0x597/0xd00 [ 487.227719][ T332] ? do_compat_pwritev64+0x1c0/0x1c0 [ 487.233031][ T332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 487.239480][ T332] ? fput+0x1b/0x20 [ 487.243313][ T332] __x64_sys_sendfile64+0x1dd/0x220 [ 487.248540][ T332] ? __ia32_sys_sendfile+0x230/0x230 [ 487.253847][ T332] ? do_syscall_64+0x26/0x610 [ 487.258540][ T332] ? lockdep_hardirqs_on+0x418/0x5d0 [ 487.263868][ T332] ? trace_hardirqs_on+0x67/0x230 [ 487.269013][ T332] do_syscall_64+0x103/0x610 [ 487.273614][ T332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.279526][ T332] RIP: 0033:0x4582b9 [ 487.283423][ T332] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.303212][ T332] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 487.311637][ T332] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 487.319604][ T332] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 487.327591][ T332] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 487.335589][ T332] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 17:31:00 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 17:31:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4d, 0x0) 17:31:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200040, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000240)="f62ee0a53c53d012b519b0cd84b77b045f7dcce8c2333b0a0a0c8cf26415060d6059cea582dd91c50cc9e677da00eb76cc6aa3b321dafbee66e58b484515d323de576050e2e3eca7da830940a5a12a01718db6a87f41fe6cb758bd596d68d21f122f27cdccec99db972308dd90347d37906ce93b4a94c53401de7d12f672d539c39eeb9281052c84a78676945e9146da4d1a386d5d627a97f96280743a511a166fa092d1b4a68b02b101e65611d201be5456cc4da3313cef793c7d77074a47d994075b2dd3cd68fda11eb79cabf2cb7ddd350f137d0f86641ae6cba8e3") ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000140)={0x7, 0x2, 0x0, 0x80000001, 0x6, 0x1}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6c1c46451474686534191a5b93cb2f6f653d30783020304430303030303030313230302c6d61785f9b9405de060018773030303030303030303030303033662c00"]) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) clock_settime(0x3, &(0x7f0000000040)) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x400000000000000) [ 487.343580][ T332] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:00 executing program 0 (fault-call:4 fault-nth:17): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4e, 0x0) 17:31:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x500000000000000) 17:31:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x7, 0x480) ioctl$RTC_AIE_OFF(r1, 0x7002) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 487.628341][ T370] FAULT_INJECTION: forcing a failure. [ 487.628341][ T370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.656506][ T370] CPU: 0 PID: 370 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 487.664441][ T370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.674599][ T370] Call Trace: [ 487.677915][ T370] dump_stack+0x172/0x1f0 [ 487.682269][ T370] should_fail.cold+0xa/0x15 [ 487.686889][ T370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.692719][ T370] ? ___might_sleep+0x163/0x280 [ 487.697584][ T370] should_fail_alloc_page+0x50/0x60 [ 487.702780][ T370] __alloc_pages_nodemask+0x1a1/0x7e0 [ 487.708193][ T370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.714026][ T370] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 487.714042][ T370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.714061][ T370] ? __kmalloc_node+0x3d/0x70 [ 487.714075][ T370] ? rcu_read_lock_sched_held+0x110/0x130 [ 487.714089][ T370] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 487.714104][ T370] alloc_pages_current+0x107/0x210 [ 487.714122][ T370] push_pipe+0x3fc/0x7a0 [ 487.714144][ T370] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 487.726150][ T370] ? __save_stack_trace+0x99/0x100 [ 487.762994][ T370] ? iov_iter_revert+0xaa0/0xaa0 [ 487.768046][ T370] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 487.773792][ T370] ? iov_iter_pipe+0xba/0x2f0 [ 487.778502][ T370] default_file_splice_read+0x199/0x890 [ 487.784073][ T370] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 487.789987][ T370] ? kasan_kmalloc+0x9/0x10 [ 487.794509][ T370] ? __kmalloc+0x15c/0x740 [ 487.798968][ T370] ? alloc_pipe_info+0x199/0x430 [ 487.803929][ T370] ? do_sendfile+0x597/0xd00 [ 487.808553][ T370] ? do_syscall_64+0x103/0x610 [ 487.813536][ T370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.819717][ T370] ? __lock_acquire+0x548/0x3fb0 [ 487.824738][ T370] ? iter_file_splice_write+0xbe0/0xbe0 [ 487.830505][ T370] ? percpu_ref_put_many+0x94/0x190 [ 487.835730][ T370] ? percpu_ref_put_many+0x94/0x190 [ 487.835747][ T370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.835761][ T370] ? fsnotify+0x811/0xbc0 [ 487.835780][ T370] ? fsnotify+0xbc0/0xbc0 [ 487.835794][ T370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.835810][ T370] ? fsnotify_first_mark+0x210/0x210 [ 487.835824][ T370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.835853][ T370] ? security_file_permission+0x94/0x380 [ 487.835874][ T370] ? iter_file_splice_write+0xbe0/0xbe0 [ 487.835889][ T370] do_splice_to+0x12a/0x190 [ 487.835911][ T370] splice_direct_to_actor+0x2d2/0x970 [ 487.851702][ T370] ? generic_pipe_buf_nosteal+0x10/0x10 [ 487.851726][ T370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.851740][ T370] ? do_splice_to+0x190/0x190 [ 487.851760][ T370] ? rw_verify_area+0x118/0x360 [ 487.851779][ T370] do_splice_direct+0x1da/0x2a0 [ 487.889510][ T370] ? splice_direct_to_actor+0x970/0x970 17:31:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x600000000000000) 17:31:01 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 17:31:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x4f, 0x0) [ 487.889539][ T370] ? rw_verify_area+0x118/0x360 [ 487.889558][ T370] do_sendfile+0x597/0xd00 [ 487.889582][ T370] ? do_compat_pwritev64+0x1c0/0x1c0 [ 487.921362][ T370] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 487.921381][ T370] ? fput+0x1b/0x20 [ 487.921403][ T370] __x64_sys_sendfile64+0x1dd/0x220 [ 487.921422][ T370] ? __ia32_sys_sendfile+0x230/0x230 [ 487.921445][ T370] ? do_syscall_64+0x26/0x610 [ 487.936290][ T370] ? lockdep_hardirqs_on+0x418/0x5d0 [ 487.936309][ T370] ? trace_hardirqs_on+0x67/0x230 [ 487.936331][ T370] do_syscall_64+0x103/0x610 [ 487.936352][ T370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.936364][ T370] RIP: 0033:0x4582b9 [ 487.936378][ T370] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.936385][ T370] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 487.936399][ T370] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 17:31:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:01 executing program 0 (fault-call:4 fault-nth:18): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 487.936406][ T370] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 487.936414][ T370] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 487.936421][ T370] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 487.936429][ T370] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x700000000000000) [ 488.191221][ T492] FAULT_INJECTION: forcing a failure. [ 488.191221][ T492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:31:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x3}, 0x10) 17:31:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x900000000000000) 17:31:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x50, 0x0) [ 488.259536][ T492] CPU: 1 PID: 492 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 488.267415][ T492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.277489][ T492] Call Trace: [ 488.280804][ T492] dump_stack+0x172/0x1f0 [ 488.285171][ T492] should_fail.cold+0xa/0x15 [ 488.289791][ T492] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.295633][ T492] ? ___might_sleep+0x163/0x280 [ 488.300859][ T492] should_fail_alloc_page+0x50/0x60 [ 488.306069][ T492] __alloc_pages_nodemask+0x1a1/0x7e0 [ 488.311439][ T492] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.317268][ T492] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 488.323009][ T492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.329270][ T492] ? __kmalloc_node+0x3d/0x70 [ 488.333978][ T492] ? rcu_read_lock_sched_held+0x110/0x130 [ 488.339707][ T492] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 488.345966][ T492] alloc_pages_current+0x107/0x210 [ 488.351099][ T492] push_pipe+0x3fc/0x7a0 [ 488.355345][ T492] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 488.360975][ T492] ? __save_stack_trace+0x99/0x100 [ 488.366087][ T492] ? iov_iter_revert+0xaa0/0xaa0 [ 488.371026][ T492] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 488.376759][ T492] ? iov_iter_pipe+0xba/0x2f0 [ 488.381559][ T492] default_file_splice_read+0x199/0x890 [ 488.387232][ T492] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 488.393057][ T492] ? kasan_kmalloc+0x9/0x10 [ 488.397559][ T492] ? __kmalloc+0x15c/0x740 [ 488.404170][ T492] ? alloc_pipe_info+0x199/0x430 [ 488.411492][ T492] ? do_sendfile+0x597/0xd00 [ 488.416099][ T492] ? do_syscall_64+0x103/0x610 [ 488.420864][ T492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.426936][ T492] ? __lock_acquire+0x548/0x3fb0 [ 488.431878][ T492] ? iter_file_splice_write+0xbe0/0xbe0 [ 488.437431][ T492] ? percpu_ref_put_many+0x94/0x190 [ 488.442658][ T492] ? percpu_ref_put_many+0x94/0x190 [ 488.447896][ T492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.455212][ T492] ? fsnotify+0x811/0xbc0 [ 488.459547][ T492] ? fsnotify+0xbc0/0xbc0 [ 488.463879][ T492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.470120][ T492] ? fsnotify_first_mark+0x210/0x210 [ 488.475405][ T492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.481656][ T492] ? security_file_permission+0x94/0x380 [ 488.487339][ T492] ? iter_file_splice_write+0xbe0/0xbe0 [ 488.492906][ T492] do_splice_to+0x12a/0x190 [ 488.497417][ T492] splice_direct_to_actor+0x2d2/0x970 [ 488.502995][ T492] ? generic_pipe_buf_nosteal+0x10/0x10 [ 488.508572][ T492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.514815][ T492] ? do_splice_to+0x190/0x190 [ 488.519528][ T492] ? rw_verify_area+0x118/0x360 [ 488.524386][ T492] do_splice_direct+0x1da/0x2a0 [ 488.529460][ T492] ? splice_direct_to_actor+0x970/0x970 [ 488.535013][ T492] ? rw_verify_area+0x118/0x360 [ 488.539867][ T492] do_sendfile+0x597/0xd00 [ 488.544296][ T492] ? do_compat_pwritev64+0x1c0/0x1c0 [ 488.549676][ T492] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 488.555963][ T492] ? fput+0x1b/0x20 [ 488.559802][ T492] __x64_sys_sendfile64+0x1dd/0x220 [ 488.565016][ T492] ? __ia32_sys_sendfile+0x230/0x230 [ 488.570316][ T492] ? do_syscall_64+0x26/0x610 [ 488.575015][ T492] ? lockdep_hardirqs_on+0x418/0x5d0 [ 488.580317][ T492] ? trace_hardirqs_on+0x67/0x230 [ 488.585475][ T492] do_syscall_64+0x103/0x610 [ 488.590090][ T492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.595995][ T492] RIP: 0033:0x4582b9 [ 488.599917][ T492] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.619525][ T492] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 488.628092][ T492] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 488.636078][ T492] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 488.647093][ T492] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 488.655500][ T492] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 488.667523][ T492] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:01 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 17:31:01 executing program 0 (fault-call:4 fault-nth:19): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x51, 0x0) 17:31:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0xa00000000000000) 17:31:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000003c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x52, 0x0) 17:31:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:02 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 488.957230][ T520] FAULT_INJECTION: forcing a failure. [ 488.957230][ T520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.005698][ T520] CPU: 0 PID: 520 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 489.013549][ T520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.013557][ T520] Call Trace: [ 489.013584][ T520] dump_stack+0x172/0x1f0 [ 489.013607][ T520] should_fail.cold+0xa/0x15 [ 489.013628][ T520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.013647][ T520] ? ___might_sleep+0x163/0x280 [ 489.013673][ T520] should_fail_alloc_page+0x50/0x60 [ 489.013690][ T520] __alloc_pages_nodemask+0x1a1/0x7e0 [ 489.013708][ T520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.013734][ T520] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 489.046765][ T520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.046788][ T520] ? __kmalloc_node+0x3d/0x70 [ 489.046803][ T520] ? rcu_read_lock_sched_held+0x110/0x130 [ 489.046817][ T520] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 489.046835][ T520] alloc_pages_current+0x107/0x210 [ 489.046852][ T520] push_pipe+0x3fc/0x7a0 [ 489.046874][ T520] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 489.046891][ T520] ? __save_stack_trace+0x99/0x100 [ 489.046909][ T520] ? iov_iter_revert+0xaa0/0xaa0 [ 489.046930][ T520] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 489.117218][ T520] ? iov_iter_pipe+0xba/0x2f0 [ 489.117240][ T520] default_file_splice_read+0x199/0x890 [ 489.117256][ T520] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 489.117269][ T520] ? kasan_kmalloc+0x9/0x10 [ 489.117280][ T520] ? __kmalloc+0x15c/0x740 [ 489.117294][ T520] ? alloc_pipe_info+0x199/0x430 [ 489.117310][ T520] ? do_sendfile+0x597/0xd00 [ 489.117326][ T520] ? do_syscall_64+0x103/0x610 [ 489.117340][ T520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.117354][ T520] ? __lock_acquire+0x548/0x3fb0 [ 489.117369][ T520] ? iter_file_splice_write+0xbe0/0xbe0 [ 489.117391][ T520] ? percpu_ref_put_many+0x94/0x190 [ 489.133349][ T520] ? percpu_ref_put_many+0x94/0x190 [ 489.133366][ T520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.133380][ T520] ? fsnotify+0x811/0xbc0 [ 489.133397][ T520] ? fsnotify+0xbc0/0xbc0 [ 489.133410][ T520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.133424][ T520] ? fsnotify_first_mark+0x210/0x210 [ 489.133445][ T520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.184379][ T520] ? security_file_permission+0x94/0x380 [ 489.184404][ T520] ? iter_file_splice_write+0xbe0/0xbe0 [ 489.184419][ T520] do_splice_to+0x12a/0x190 [ 489.184437][ T520] splice_direct_to_actor+0x2d2/0x970 [ 489.184453][ T520] ? generic_pipe_buf_nosteal+0x10/0x10 [ 489.184473][ T520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:31:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4800000000000000) 17:31:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x53, 0x0) [ 489.184487][ T520] ? do_splice_to+0x190/0x190 [ 489.184511][ T520] ? rw_verify_area+0x118/0x360 [ 489.200305][ T520] do_splice_direct+0x1da/0x2a0 [ 489.200325][ T520] ? splice_direct_to_actor+0x970/0x970 [ 489.200351][ T520] ? rw_verify_area+0x118/0x360 [ 489.200370][ T520] do_sendfile+0x597/0xd00 [ 489.200396][ T520] ? do_compat_pwritev64+0x1c0/0x1c0 [ 489.200413][ T520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 489.200429][ T520] ? fput+0x1b/0x20 [ 489.200451][ T520] __x64_sys_sendfile64+0x1dd/0x220 [ 489.305324][ T520] ? __ia32_sys_sendfile+0x230/0x230 [ 489.310636][ T520] ? do_syscall_64+0x26/0x610 [ 489.315328][ T520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 489.315348][ T520] ? trace_hardirqs_on+0x67/0x230 [ 489.315368][ T520] do_syscall_64+0x103/0x610 [ 489.315387][ T520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.315398][ T520] RIP: 0033:0x4582b9 [ 489.315413][ T520] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.315420][ T520] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 489.315433][ T520] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 489.315441][ T520] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 489.315449][ T520] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 489.315458][ T520] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 17:31:02 executing program 0 (fault-call:4 fault-nth:20): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x4c00000000000000) [ 489.315466][ T520] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6800000000000000) 17:31:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x5, 0x40, 0x7d, 0x100, 0x4d}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x54, 0x0) [ 489.488131][ T548] FAULT_INJECTION: forcing a failure. [ 489.488131][ T548] name failslab, interval 1, probability 0, space 0, times 0 [ 489.538006][ T548] CPU: 0 PID: 548 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 489.545868][ T548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.555935][ T548] Call Trace: [ 489.555969][ T548] dump_stack+0x172/0x1f0 [ 489.555993][ T548] should_fail.cold+0xa/0x15 [ 489.556013][ T548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.556034][ T548] ? ___might_sleep+0x163/0x280 [ 489.556054][ T548] __should_failslab+0x121/0x190 [ 489.556082][ T548] should_failslab+0x9/0x14 [ 489.574114][ T548] kmem_cache_alloc_node_trace+0x270/0x720 [ 489.574130][ T548] ? find_held_lock+0x35/0x130 [ 489.574148][ T548] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 489.574173][ T548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.574201][ T548] __kmalloc_node+0x3d/0x70 [ 489.574219][ T548] kvmalloc_node+0x68/0x100 [ 489.574232][ T548] ? seq_dentry+0x2d0/0x2d0 [ 489.574244][ T548] seq_read+0x832/0x1130 [ 489.574262][ T548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.574280][ T548] ? seq_dentry+0x2d0/0x2d0 [ 489.574294][ T548] proc_reg_read+0x1fe/0x2c0 [ 489.574318][ T548] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 489.584157][ T548] ? rw_verify_area+0x118/0x360 [ 489.584194][ T548] do_iter_read+0x4a9/0x660 [ 489.584211][ T548] ? dup_iter+0x260/0x260 [ 489.584234][ T548] vfs_readv+0xf0/0x160 [ 489.584246][ T548] ? alloc_pages_current+0x10f/0x210 [ 489.584262][ T548] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 489.584277][ T548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 17:31:02 executing program 0 (fault-call:4 fault-nth:21): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:02 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x6c00000000000000) [ 489.584300][ T548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.594598][ T548] ? iov_iter_get_pages_alloc+0x3ae/0x1350 [ 489.594622][ T548] ? iov_iter_revert+0xaa0/0xaa0 [ 489.594640][ T548] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 489.594654][ T548] ? iov_iter_pipe+0xba/0x2f0 [ 489.594675][ T548] default_file_splice_read+0x475/0x890 [ 489.594692][ T548] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 489.594704][ T548] ? kasan_kmalloc+0x9/0x10 [ 489.594716][ T548] ? __kmalloc+0x15c/0x740 [ 489.594730][ T548] ? alloc_pipe_info+0x199/0x430 [ 489.594750][ T548] ? iter_file_splice_write+0xbe0/0xbe0 [ 489.594772][ T548] ? percpu_ref_put_many+0x94/0x190 [ 489.594791][ T548] ? percpu_ref_put_many+0x94/0x190 [ 489.605210][ T548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.605256][ T548] ? security_file_permission+0x94/0x380 [ 489.605278][ T548] ? iter_file_splice_write+0xbe0/0xbe0 [ 489.605292][ T548] do_splice_to+0x12a/0x190 [ 489.605309][ T548] splice_direct_to_actor+0x2d2/0x970 [ 489.605325][ T548] ? generic_pipe_buf_nosteal+0x10/0x10 [ 489.605346][ T548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.616254][ T548] ? do_splice_to+0x190/0x190 [ 489.616275][ T548] ? rw_verify_area+0x118/0x360 [ 489.616293][ T548] do_splice_direct+0x1da/0x2a0 [ 489.616311][ T548] ? splice_direct_to_actor+0x970/0x970 [ 489.616335][ T548] ? rw_verify_area+0x118/0x360 [ 489.616351][ T548] do_sendfile+0x597/0xd00 [ 489.616375][ T548] ? do_compat_pwritev64+0x1c0/0x1c0 [ 489.616398][ T548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 489.625377][ T548] ? fput+0x1b/0x20 [ 489.625399][ T548] __x64_sys_sendfile64+0x1dd/0x220 [ 489.625418][ T548] ? __ia32_sys_sendfile+0x230/0x230 [ 489.625434][ T548] ? do_syscall_64+0x26/0x610 [ 489.625450][ T548] ? lockdep_hardirqs_on+0x418/0x5d0 [ 489.625465][ T548] ? trace_hardirqs_on+0x67/0x230 [ 489.625482][ T548] do_syscall_64+0x103/0x610 [ 489.625500][ T548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.625511][ T548] RIP: 0033:0x4582b9 [ 489.625526][ T548] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.625540][ T548] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 489.636126][ T548] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 489.636135][ T548] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 489.636143][ T548] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 489.636151][ T548] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 489.636170][ T548] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7400000000000000) 17:31:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x55, 0x0) [ 490.107619][ T568] FAULT_INJECTION: forcing a failure. [ 490.107619][ T568] name failslab, interval 1, probability 0, space 0, times 0 17:31:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1800010, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'lo,vboxnet0:vmnet1ppp1vmnet1[%selfkeyring'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 490.202323][ T568] CPU: 1 PID: 568 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 490.210197][ T568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.220463][ T568] Call Trace: [ 490.223784][ T568] dump_stack+0x172/0x1f0 [ 490.228156][ T568] should_fail.cold+0xa/0x15 [ 490.232826][ T568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.238678][ T568] ? ___might_sleep+0x163/0x280 [ 490.243630][ T568] __should_failslab+0x121/0x190 17:31:03 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x56, 0x0) [ 490.248593][ T568] should_failslab+0x9/0x14 [ 490.253122][ T568] kmem_cache_alloc_node_trace+0x270/0x720 [ 490.258958][ T568] ? find_held_lock+0x35/0x130 [ 490.263745][ T568] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 490.269478][ T568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.275921][ T568] __kmalloc_node+0x3d/0x70 [ 490.280457][ T568] kvmalloc_node+0x68/0x100 [ 490.284953][ T568] ? seq_dentry+0x2d0/0x2d0 [ 490.289456][ T568] seq_read+0x832/0x1130 [ 490.293717][ T568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 490.299961][ T568] ? seq_dentry+0x2d0/0x2d0 [ 490.304464][ T568] proc_reg_read+0x1fe/0x2c0 [ 490.309055][ T568] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 490.314523][ T568] ? rw_verify_area+0x118/0x360 [ 490.319470][ T568] do_iter_read+0x4a9/0x660 [ 490.323957][ T568] ? dup_iter+0x260/0x260 [ 490.328461][ T568] vfs_readv+0xf0/0x160 [ 490.332604][ T568] ? alloc_pages_current+0x10f/0x210 [ 490.337897][ T568] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 490.344077][ T568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 490.350358][ T568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 490.356601][ T568] ? iov_iter_get_pages_alloc+0x3ae/0x1350 [ 490.362411][ T568] ? iov_iter_revert+0xaa0/0xaa0 [ 490.367457][ T568] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 490.373200][ T568] ? iov_iter_pipe+0xba/0x2f0 [ 490.377911][ T568] default_file_splice_read+0x475/0x890 [ 490.383463][ T568] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 490.389293][ T568] ? kasan_kmalloc+0x9/0x10 [ 490.393795][ T568] ? __kmalloc+0x15c/0x740 [ 490.408841][ T568] ? alloc_pipe_info+0x199/0x430 [ 490.413793][ T568] ? iter_file_splice_write+0xbe0/0xbe0 [ 490.419368][ T568] ? percpu_ref_put_many+0x94/0x190 [ 490.424601][ T568] ? percpu_ref_put_many+0x94/0x190 [ 490.429790][ T568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.436034][ T568] ? security_file_permission+0x94/0x380 [ 490.441717][ T568] ? iter_file_splice_write+0xbe0/0xbe0 [ 490.447274][ T568] do_splice_to+0x12a/0x190 [ 490.453191][ T568] splice_direct_to_actor+0x2d2/0x970 [ 490.458589][ T568] ? generic_pipe_buf_nosteal+0x10/0x10 [ 490.464152][ T568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.470412][ T568] ? do_splice_to+0x190/0x190 [ 490.475079][ T568] ? rw_verify_area+0x118/0x360 [ 490.479943][ T568] do_splice_direct+0x1da/0x2a0 [ 490.484798][ T568] ? splice_direct_to_actor+0x970/0x970 [ 490.490364][ T568] ? rw_verify_area+0x118/0x360 [ 490.495232][ T568] do_sendfile+0x597/0xd00 [ 490.499659][ T568] ? do_compat_pwritev64+0x1c0/0x1c0 [ 490.504954][ T568] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 490.512929][ T568] ? fput+0x1b/0x20 [ 490.516755][ T568] __x64_sys_sendfile64+0x1dd/0x220 [ 490.521963][ T568] ? __ia32_sys_sendfile+0x230/0x230 [ 490.527237][ T568] ? do_syscall_64+0x26/0x610 [ 490.531916][ T568] ? lockdep_hardirqs_on+0x418/0x5d0 [ 490.537203][ T568] ? trace_hardirqs_on+0x67/0x230 [ 490.542263][ T568] do_syscall_64+0x103/0x610 [ 490.548964][ T568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.554852][ T568] RIP: 0033:0x4582b9 [ 490.558747][ T568] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.578475][ T568] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 490.587473][ T568] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 490.595457][ T568] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 490.603437][ T568] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 490.611425][ T568] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 490.619532][ T568] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x7a00000000000000) 17:31:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x57, 0x0) 17:31:03 executing program 0 (fault-call:4 fault-nth:22): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:03 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda}, 0x10) 17:31:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) [ 490.889243][ T599] FAULT_INJECTION: forcing a failure. [ 490.889243][ T599] name failslab, interval 1, probability 0, space 0, times 0 [ 490.912441][ T599] CPU: 0 PID: 599 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 490.920303][ T599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.930376][ T599] Call Trace: [ 490.933702][ T599] dump_stack+0x172/0x1f0 [ 490.938063][ T599] should_fail.cold+0xa/0x15 [ 490.942681][ T599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.948525][ T599] ? ___might_sleep+0x163/0x280 [ 490.953401][ T599] __should_failslab+0x121/0x190 [ 490.958384][ T599] should_failslab+0x9/0x14 [ 490.962905][ T599] kmem_cache_alloc_node+0x264/0x710 [ 490.968228][ T599] __alloc_skb+0xd5/0x5e0 [ 490.972577][ T599] ? skb_trim+0x190/0x190 [ 490.977025][ T599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.983341][ T599] ? netlink_autobind.isra.0+0x228/0x310 [ 490.988995][ T599] netlink_sendmsg+0x97b/0xd70 [ 490.989019][ T599] ? netlink_unicast+0x720/0x720 [ 490.989039][ T599] ? tomoyo_socket_sendmsg+0x26/0x30 [ 490.989057][ T599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.989094][ T599] ? security_socket_sendmsg+0x93/0xc0 [ 490.998774][ T599] ? netlink_unicast+0x720/0x720 [ 490.998795][ T599] sock_sendmsg+0xdd/0x130 [ 490.998813][ T599] kernel_sendmsg+0x44/0x50 [ 490.998829][ T599] sock_no_sendpage+0x116/0x150 [ 490.998848][ T599] ? sock_kfree_s+0x70/0x70 [ 491.020778][ T599] ? iov_iter_advance+0x295/0xf70 [ 491.029727][ T599] ? kvfree+0x61/0x70 [ 491.029751][ T599] kernel_sendpage+0x95/0xf0 [ 491.029764][ T599] ? sock_kfree_s+0x70/0x70 [ 491.029779][ T599] sock_sendpage+0x8b/0xc0 [ 491.029796][ T599] pipe_to_sendpage+0x299/0x370 [ 491.029808][ T599] ? kernel_sendpage+0xf0/0xf0 [ 491.029822][ T599] ? direct_splice_actor+0x1a0/0x1a0 [ 491.029837][ T599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.029851][ T599] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 491.029869][ T599] __splice_from_pipe+0x395/0x7d0 [ 491.029882][ T599] ? direct_splice_actor+0x1a0/0x1a0 [ 491.029905][ T599] ? direct_splice_actor+0x1a0/0x1a0 [ 491.039535][ T599] splice_from_pipe+0x108/0x170 [ 491.039555][ T599] ? splice_shrink_spd+0xd0/0xd0 [ 491.039582][ T599] ? security_file_permission+0x94/0x380 [ 491.039598][ T599] generic_splice_sendpage+0x3c/0x50 [ 491.039609][ T599] ? splice_from_pipe+0x170/0x170 [ 491.039623][ T599] direct_splice_actor+0x126/0x1a0 17:31:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ne\xf2J\x84\x15\x1f\xcfB\x94\xee\xb3\x19B\xbf\x02\xc1%\xa8\x84\x98\xc8\x13\xc7\x88\xef\xbeS\xb3q\x17') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) [ 491.039640][ T599] splice_direct_to_actor+0x369/0x970 [ 491.039655][ T599] ? generic_pipe_buf_nosteal+0x10/0x10 [ 491.039675][ T599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.039687][ T599] ? do_splice_to+0x190/0x190 [ 491.039705][ T599] ? rw_verify_area+0x118/0x360 [ 491.039725][ T599] do_splice_direct+0x1da/0x2a0 [ 491.057857][ T599] ? splice_direct_to_actor+0x970/0x970 [ 491.057886][ T599] ? rw_verify_area+0x118/0x360 [ 491.057904][ T599] do_sendfile+0x597/0xd00 [ 491.057928][ T599] ? do_compat_pwritev64+0x1c0/0x1c0 [ 491.067221][ T599] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 491.067237][ T599] ? fput+0x1b/0x20 [ 491.067257][ T599] __x64_sys_sendfile64+0x1dd/0x220 [ 491.067273][ T599] ? __ia32_sys_sendfile+0x230/0x230 [ 491.067288][ T599] ? do_syscall_64+0x26/0x610 [ 491.067304][ T599] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.067319][ T599] ? trace_hardirqs_on+0x67/0x230 [ 491.067336][ T599] do_syscall_64+0x103/0x610 [ 491.067354][ T599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.067366][ T599] RIP: 0033:0x4582b9 [ 491.067387][ T599] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.183069][ T599] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 491.194576][ T599] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 491.194586][ T599] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 491.194594][ T599] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 491.194603][ T599] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 491.194612][ T599] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:04 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda}, 0x10) 17:31:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x58, 0x0) 17:31:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:04 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) getgroups(0x1, &(0x7f0000000180)=[0xffffffffffffffff]) setregid(r1, r1) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000002440)=[{&(0x7f0000000100)=""/11}, {&(0x7f0000000140)=""/117}, {&(0x7f00000001c0)=""/4096}, {&(0x7f00000011c0)=""/249}, {&(0x7f00000012c0)=""/213}, {&(0x7f00000013c0)}, {&(0x7f0000001440)=""/4096}], 0x10000000000000f8, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400000, 0x0) 17:31:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x59, 0x0) 17:31:04 executing program 0 (fault-call:4 fault-nth:23): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:04 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda}, 0x10) [ 491.602995][ T630] FAULT_INJECTION: forcing a failure. [ 491.602995][ T630] name failslab, interval 1, probability 0, space 0, times 0 [ 491.632318][ T630] CPU: 0 PID: 630 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 491.640177][ T630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.640192][ T630] Call Trace: [ 491.653575][ T630] dump_stack+0x172/0x1f0 [ 491.657926][ T630] should_fail.cold+0xa/0x15 [ 491.662542][ T630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.668383][ T630] ? ___might_sleep+0x163/0x280 [ 491.675271][ T630] __should_failslab+0x121/0x190 [ 491.680428][ T630] should_failslab+0x9/0x14 [ 491.680447][ T630] kmem_cache_alloc_node_trace+0x270/0x720 [ 491.680474][ T630] __kmalloc_node_track_caller+0x3d/0x70 [ 491.680497][ T630] __kmalloc_reserve.isra.0+0x40/0xf0 [ 491.701836][ T630] __alloc_skb+0x10b/0x5e0 [ 491.706273][ T630] ? skb_trim+0x190/0x190 [ 491.710618][ T630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.716866][ T630] ? netlink_autobind.isra.0+0x228/0x310 [ 491.722520][ T630] netlink_sendmsg+0x97b/0xd70 [ 491.727399][ T630] ? netlink_unicast+0x720/0x720 [ 491.732370][ T630] ? tomoyo_socket_sendmsg+0x26/0x30 [ 491.737683][ T630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.743946][ T630] ? security_socket_sendmsg+0x93/0xc0 [ 491.749429][ T630] ? netlink_unicast+0x720/0x720 [ 491.754392][ T630] sock_sendmsg+0xdd/0x130 [ 491.758837][ T630] kernel_sendmsg+0x44/0x50 [ 491.763372][ T630] sock_no_sendpage+0x116/0x150 [ 491.768690][ T630] ? sock_kfree_s+0x70/0x70 [ 491.773236][ T630] ? iov_iter_advance+0x295/0xf70 [ 491.778293][ T630] ? kvfree+0x61/0x70 [ 491.782644][ T630] kernel_sendpage+0x95/0xf0 [ 491.782658][ T630] ? sock_kfree_s+0x70/0x70 [ 491.782676][ T630] sock_sendpage+0x8b/0xc0 [ 491.782694][ T630] pipe_to_sendpage+0x299/0x370 17:31:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5a, 0x0) [ 491.782714][ T630] ? kernel_sendpage+0xf0/0xf0 [ 491.801213][ T630] ? direct_splice_actor+0x1a0/0x1a0 [ 491.801232][ T630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.801257][ T630] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 491.811349][ T630] __splice_from_pipe+0x395/0x7d0 [ 491.811367][ T630] ? direct_splice_actor+0x1a0/0x1a0 [ 491.811388][ T630] ? direct_splice_actor+0x1a0/0x1a0 [ 491.811409][ T630] splice_from_pipe+0x108/0x170 [ 491.823759][ T630] ? splice_shrink_spd+0xd0/0xd0 [ 491.823786][ T630] ? security_file_permission+0x94/0x380 [ 491.823803][ T630] generic_splice_sendpage+0x3c/0x50 [ 491.823815][ T630] ? splice_from_pipe+0x170/0x170 [ 491.823830][ T630] direct_splice_actor+0x126/0x1a0 [ 491.823846][ T630] splice_direct_to_actor+0x369/0x970 [ 491.823862][ T630] ? generic_pipe_buf_nosteal+0x10/0x10 [ 491.823883][ T630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.823903][ T630] ? do_splice_to+0x190/0x190 [ 491.834319][ T630] ? rw_verify_area+0x118/0x360 [ 491.834339][ T630] do_splice_direct+0x1da/0x2a0 [ 491.834355][ T630] ? splice_direct_to_actor+0x970/0x970 [ 491.834377][ T630] ? rw_verify_area+0x118/0x360 [ 491.834393][ T630] do_sendfile+0x597/0xd00 [ 491.834418][ T630] ? do_compat_pwritev64+0x1c0/0x1c0 [ 491.834435][ T630] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 491.834455][ T630] ? fput+0x1b/0x20 [ 491.932337][ T630] __x64_sys_sendfile64+0x1dd/0x220 [ 491.937570][ T630] ? __ia32_sys_sendfile+0x230/0x230 [ 491.942880][ T630] ? do_syscall_64+0x26/0x610 [ 491.947579][ T630] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.952898][ T630] ? trace_hardirqs_on+0x67/0x230 [ 491.957950][ T630] do_syscall_64+0x103/0x610 [ 491.957973][ T630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.957985][ T630] RIP: 0033:0x4582b9 [ 491.958001][ T630] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.958009][ T630] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:31:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$RTC_WIE_OFF(r0, 0x7010) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) 17:31:05 executing program 0 (fault-call:4 fault-nth:24): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:05 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda}, 0x10) [ 491.958024][ T630] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 491.958031][ T630] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 491.958039][ T630] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 491.958048][ T630] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 491.958056][ T630] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5b, 0x0) [ 492.197318][ T754] FAULT_INJECTION: forcing a failure. [ 492.197318][ T754] name failslab, interval 1, probability 0, space 0, times 0 [ 492.239716][ T754] CPU: 0 PID: 754 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 492.247594][ T754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.257663][ T754] Call Trace: [ 492.260982][ T754] dump_stack+0x172/0x1f0 [ 492.265351][ T754] should_fail.cold+0xa/0x15 [ 492.269985][ T754] ? __netlink_lookup+0x3c8/0x7a0 [ 492.270018][ T754] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.270043][ T754] __should_failslab+0x121/0x190 [ 492.270063][ T754] should_failslab+0x9/0x14 [ 492.286325][ T754] kmem_cache_alloc+0x47/0x6f0 [ 492.286346][ T754] ? lock_acquire+0x16f/0x3f0 [ 492.286362][ T754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.286391][ T754] skb_clone+0x150/0x3b0 [ 492.311391][ T754] netlink_deliver_tap+0x95c/0xc00 [ 492.311414][ T754] netlink_unicast+0x5a7/0x720 [ 492.311434][ T754] ? netlink_attachskb+0x770/0x770 [ 492.321334][ T754] ? _copy_from_iter_full+0x25d/0x900 [ 492.321352][ T754] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 492.321368][ T754] ? __check_object_size+0x3d/0x42f [ 492.321389][ T754] netlink_sendmsg+0x8ae/0xd70 [ 492.321409][ T754] ? netlink_unicast+0x720/0x720 [ 492.352784][ T754] ? tomoyo_socket_sendmsg+0x26/0x30 [ 492.358084][ T754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.364420][ T754] ? security_socket_sendmsg+0x93/0xc0 [ 492.369910][ T754] ? netlink_unicast+0x720/0x720 [ 492.374875][ T754] sock_sendmsg+0xdd/0x130 [ 492.379415][ T754] kernel_sendmsg+0x44/0x50 [ 492.379433][ T754] sock_no_sendpage+0x116/0x150 17:31:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000140), 0x1, 0x0) 17:31:05 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=']bdev@GPL\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xffff, 0x200, 0xfffffffffffffffb, 0x8001, 0x0, 0x20, 0x20003, 0x1, 0x7, 0x5, 0x6, 0x9, 0xfffffffffffffffd, 0xfd53, 0xfe, 0x100000000, 0x1000, 0x5, 0x0, 0xfffffffffffffbff, 0x1000, 0x5, 0x8, 0x4, 0x9, 0x4d, 0x10001, 0x601, 0x0, 0x80, 0x8000, 0x5, 0xffff, 0x5, 0x9, 0x2114, 0x0, 0x2, 0x3, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x9, 0x7, 0x7, 0xee, 0x6, 0x9}, 0xffffffffffffffff, 0x6, r1, 0x2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5c, 0x0) 17:31:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 492.379452][ T754] ? sock_kfree_s+0x70/0x70 [ 492.388943][ T754] ? iov_iter_advance+0x295/0xf70 [ 492.388964][ T754] ? kvfree+0x61/0x70 [ 492.388985][ T754] kernel_sendpage+0x95/0xf0 [ 492.388997][ T754] ? sock_kfree_s+0x70/0x70 [ 492.389011][ T754] sock_sendpage+0x8b/0xc0 [ 492.389028][ T754] pipe_to_sendpage+0x299/0x370 [ 492.389041][ T754] ? kernel_sendpage+0xf0/0xf0 [ 492.389056][ T754] ? direct_splice_actor+0x1a0/0x1a0 [ 492.389071][ T754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:31:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5d, 0x0) [ 492.389085][ T754] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 492.389104][ T754] __splice_from_pipe+0x395/0x7d0 [ 492.389118][ T754] ? direct_splice_actor+0x1a0/0x1a0 [ 492.389138][ T754] ? direct_splice_actor+0x1a0/0x1a0 [ 492.389158][ T754] splice_from_pipe+0x108/0x170 [ 492.468860][ T754] ? splice_shrink_spd+0xd0/0xd0 [ 492.473835][ T754] ? security_file_permission+0x94/0x380 [ 492.479526][ T754] generic_splice_sendpage+0x3c/0x50 [ 492.484953][ T754] ? splice_from_pipe+0x170/0x170 17:31:05 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1000, 0x2000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x0, 0x7d, 0x6, 0x1, 0xfd}, &(0x7f0000000340)=0x98) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in={{0x2, 0x4e24, @loopback}}}, 0x84) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000000c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000001c0)={0x20007, {{0x2, 0x4e20, @multicast2}}}, 0x88) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000440)=""/249) r3 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x7ffd) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2082, 0x0) preadv(r3, &(0x7f0000000140), 0x3d9, 0x0) [ 492.490605][ T754] direct_splice_actor+0x126/0x1a0 [ 492.496204][ T754] splice_direct_to_actor+0x369/0x970 [ 492.501613][ T754] ? generic_pipe_buf_nosteal+0x10/0x10 [ 492.507230][ T754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.513518][ T754] ? do_splice_to+0x190/0x190 [ 492.518926][ T754] ? rw_verify_area+0x118/0x360 [ 492.523809][ T754] do_splice_direct+0x1da/0x2a0 [ 492.528704][ T754] ? splice_direct_to_actor+0x970/0x970 [ 492.534327][ T754] ? rw_verify_area+0x118/0x360 17:31:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5e, 0x0) [ 492.539402][ T754] do_sendfile+0x597/0xd00 [ 492.543963][ T754] ? do_compat_pwritev64+0x1c0/0x1c0 [ 492.549283][ T754] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 492.555553][ T754] ? fput+0x1b/0x20 [ 492.559576][ T754] __x64_sys_sendfile64+0x1dd/0x220 [ 492.564926][ T754] ? __ia32_sys_sendfile+0x230/0x230 [ 492.570273][ T754] ? do_syscall_64+0x26/0x610 [ 492.575324][ T754] ? lockdep_hardirqs_on+0x418/0x5d0 [ 492.583932][ T754] ? trace_hardirqs_on+0x67/0x230 17:31:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 492.591070][ T754] do_syscall_64+0x103/0x610 [ 492.596316][ T754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.602847][ T754] RIP: 0033:0x4582b9 [ 492.608060][ T754] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.631314][ T754] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:31:05 executing program 0 (fault-call:4 fault-nth:25): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:05 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda}, 0x10) [ 492.640699][ T754] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 492.640708][ T754] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 492.640716][ T754] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 492.640723][ T754] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 492.640730][ T754] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x5f, 0x0) [ 492.876326][ T999] FAULT_INJECTION: forcing a failure. [ 492.876326][ T999] name failslab, interval 1, probability 0, space 0, times 0 17:31:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x60, 0x0) 17:31:06 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1800010, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'lo,vboxnet0:vmnet1ppp1vmnet1[%selfkeyring'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 492.925233][ T999] CPU: 1 PID: 999 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 492.933442][ T999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.943540][ T999] Call Trace: [ 492.946971][ T999] dump_stack+0x172/0x1f0 [ 492.951320][ T999] should_fail.cold+0xa/0x15 [ 492.955921][ T999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.961726][ T999] ? ___might_sleep+0x163/0x280 [ 492.966589][ T999] __should_failslab+0x121/0x190 [ 492.971699][ T999] should_failslab+0x9/0x14 [ 492.976251][ T999] kmem_cache_alloc_node_trace+0x270/0x720 [ 492.982155][ T999] ? __lock_acquire+0x548/0x3fb0 [ 492.987105][ T999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.993508][ T999] ? sock_sendmsg+0x5b/0x130 [ 492.998107][ T999] __kmalloc_node+0x3d/0x70 [ 493.002612][ T999] kvmalloc_node+0x68/0x100 [ 493.007126][ T999] iov_iter_get_pages_alloc+0x862/0x1350 [ 493.012753][ T999] ? debug_check_no_obj_freed+0x200/0x464 [ 493.018489][ T999] ? iov_iter_revert+0xaa0/0xaa0 [ 493.023447][ T999] ? lockdep_hardirqs_on+0x418/0x5d0 [ 493.028742][ T999] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 493.034522][ T999] ? iov_iter_pipe+0xba/0x2f0 [ 493.039211][ T999] default_file_splice_read+0x199/0x890 [ 493.044777][ T999] ? free_unref_page+0x476/0x600 [ 493.049714][ T999] ? __put_page+0x8d/0xd0 [ 493.054040][ T999] ? trace_hardirqs_on+0x67/0x230 [ 493.059069][ T999] ? iter_file_splice_write+0xbe0/0xbe0 [ 493.064622][ T999] ? __put_page+0x92/0xd0 [ 493.068946][ T999] ? generic_pipe_buf_release+0x105/0x160 [ 493.074690][ T999] ? direct_splice_actor+0x1a0/0x1a0 [ 493.079972][ T999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.086212][ T999] ? fsnotify+0x811/0xbc0 [ 493.090554][ T999] ? fsnotify+0xbc0/0xbc0 [ 493.094884][ T999] ? fsnotify_first_mark+0x210/0x210 [ 493.100169][ T999] ? splice_shrink_spd+0xd0/0xd0 [ 493.105123][ T999] ? security_file_permission+0x94/0x380 [ 493.110762][ T999] ? iter_file_splice_write+0xbe0/0xbe0 [ 493.116303][ T999] do_splice_to+0x12a/0x190 [ 493.120807][ T999] splice_direct_to_actor+0x2d2/0x970 [ 493.126191][ T999] ? generic_pipe_buf_nosteal+0x10/0x10 [ 493.131859][ T999] ? do_splice_to+0x190/0x190 [ 493.136831][ T999] ? rw_verify_area+0x118/0x360 [ 493.142029][ T999] do_splice_direct+0x1da/0x2a0 [ 493.146881][ T999] ? splice_direct_to_actor+0x970/0x970 [ 493.152442][ T999] ? rw_verify_area+0x118/0x360 [ 493.157292][ T999] do_sendfile+0x597/0xd00 [ 493.161732][ T999] ? do_compat_pwritev64+0x1c0/0x1c0 [ 493.167091][ T999] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 493.173355][ T999] ? fput+0x1b/0x20 [ 493.177167][ T999] __x64_sys_sendfile64+0x1dd/0x220 [ 493.182365][ T999] ? __ia32_sys_sendfile+0x230/0x230 [ 493.187642][ T999] ? do_syscall_64+0x26/0x610 [ 493.192414][ T999] ? lockdep_hardirqs_on+0x418/0x5d0 [ 493.197896][ T999] ? trace_hardirqs_on+0x67/0x230 [ 493.203030][ T999] do_syscall_64+0x103/0x610 [ 493.207633][ T999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.213517][ T999] RIP: 0033:0x4582b9 [ 493.217404][ T999] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.237219][ T999] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 493.245627][ T999] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 493.253594][ T999] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 493.261931][ T999] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:31:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x202000, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)=0x5) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:06 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000001180)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000180)=""/4096, 0x1000, 0xa1, &(0x7f00000011c0)={r1, r2+10000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f00000000c0)={0x2, 0x9}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f0000000100)={0x1, 0x0, 0x103, 0x4, {0x9, 0x2, 0xffffffff80000001, 0x80cc}}) 17:31:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:06 executing program 0 (fault-call:4 fault-nth:26): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 493.269900][ T999] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 493.277885][ T999] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x61, 0x0) 17:31:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:06 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', 'fuse\x00'}, &(0x7f0000000140)='&#@md5sum]\x00', 0xb, 0x2) [ 493.505929][ T1069] FAULT_INJECTION: forcing a failure. [ 493.505929][ T1069] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:31:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x62, 0x0) 17:31:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') write$P9_RFSYNC(r0, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) creat(&(0x7f00000000c0)='./file0\x00', 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) [ 493.638036][ T1069] CPU: 0 PID: 1069 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 493.646103][ T1069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.656908][ T1069] Call Trace: [ 493.660315][ T1069] dump_stack+0x172/0x1f0 [ 493.665035][ T1069] should_fail.cold+0xa/0x15 [ 493.669728][ T1069] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.675575][ T1069] ? ___might_sleep+0x163/0x280 [ 493.680478][ T1069] should_fail_alloc_page+0x50/0x60 [ 493.685693][ T1069] __alloc_pages_nodemask+0x1a1/0x7e0 [ 493.691110][ T1069] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.697371][ T1069] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 493.697389][ T1069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.697409][ T1069] ? __kmalloc_node+0x3d/0x70 [ 493.697425][ T1069] ? rcu_read_lock_sched_held+0x110/0x130 [ 493.697439][ T1069] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 493.697456][ T1069] alloc_pages_current+0x107/0x210 [ 493.697475][ T1069] push_pipe+0x3fc/0x7a0 [ 493.697497][ T1069] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 493.726613][ T1069] ? debug_check_no_obj_freed+0x200/0x464 [ 493.726641][ T1069] ? iov_iter_revert+0xaa0/0xaa0 [ 493.726658][ T1069] ? lockdep_hardirqs_on+0x418/0x5d0 [ 493.726672][ T1069] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 493.726684][ T1069] ? iov_iter_pipe+0xba/0x2f0 [ 493.726702][ T1069] default_file_splice_read+0x199/0x890 [ 493.726718][ T1069] ? free_unref_page+0x476/0x600 [ 493.726729][ T1069] ? __put_page+0x8d/0xd0 [ 493.726746][ T1069] ? trace_hardirqs_on+0x67/0x230 [ 493.726762][ T1069] ? iter_file_splice_write+0xbe0/0xbe0 [ 493.726781][ T1069] ? __put_page+0x92/0xd0 [ 493.747817][ T1069] ? generic_pipe_buf_release+0x105/0x160 [ 493.747837][ T1069] ? direct_splice_actor+0x1a0/0x1a0 [ 493.747852][ T1069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.747867][ T1069] ? fsnotify+0x811/0xbc0 [ 493.747886][ T1069] ? fsnotify+0xbc0/0xbc0 [ 493.747900][ T1069] ? fsnotify_first_mark+0x210/0x210 [ 493.747915][ T1069] ? splice_shrink_spd+0xd0/0xd0 [ 493.747938][ T1069] ? security_file_permission+0x94/0x380 [ 493.747956][ T1069] ? iter_file_splice_write+0xbe0/0xbe0 [ 493.747970][ T1069] do_splice_to+0x12a/0x190 [ 493.747998][ T1069] splice_direct_to_actor+0x2d2/0x970 [ 493.769524][ T1069] ? generic_pipe_buf_nosteal+0x10/0x10 [ 493.769545][ T1069] ? do_splice_to+0x190/0x190 [ 493.769563][ T1069] ? rw_verify_area+0x118/0x360 [ 493.769579][ T1069] do_splice_direct+0x1da/0x2a0 [ 493.769593][ T1069] ? splice_direct_to_actor+0x970/0x970 [ 493.769613][ T1069] ? rw_verify_area+0x118/0x360 17:31:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) pwrite64(r0, &(0x7f00000000c0)="941369ba11da289137b0eab18c5baf", 0xf, 0x0) 17:31:07 executing program 0 (fault-call:4 fault-nth:27): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 493.769630][ T1069] do_sendfile+0x597/0xd00 [ 493.769653][ T1069] ? do_compat_pwritev64+0x1c0/0x1c0 [ 493.769669][ T1069] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 493.769684][ T1069] ? fput+0x1b/0x20 [ 493.769715][ T1069] __x64_sys_sendfile64+0x1dd/0x220 [ 493.785447][ T1069] ? __ia32_sys_sendfile+0x230/0x230 [ 493.785466][ T1069] ? do_syscall_64+0x26/0x610 [ 493.785482][ T1069] ? lockdep_hardirqs_on+0x418/0x5d0 [ 493.785505][ T1069] ? trace_hardirqs_on+0x67/0x230 [ 493.806129][ T1069] do_syscall_64+0x103/0x610 [ 493.806154][ T1069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.806175][ T1069] RIP: 0033:0x4582b9 [ 493.806194][ T1069] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.806202][ T1069] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 493.806216][ T1069] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 493.806223][ T1069] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 493.806231][ T1069] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 493.806239][ T1069] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 493.806247][ T1069] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 [ 494.125425][ T1281] FAULT_INJECTION: forcing a failure. [ 494.125425][ T1281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.145290][ T1281] CPU: 0 PID: 1281 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 494.153316][ T1281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.164259][ T1281] Call Trace: [ 494.167579][ T1281] dump_stack+0x172/0x1f0 [ 494.171912][ T1281] should_fail.cold+0xa/0x15 [ 494.176498][ T1281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.182324][ T1281] ? ___might_sleep+0x163/0x280 [ 494.187208][ T1281] should_fail_alloc_page+0x50/0x60 [ 494.192418][ T1281] __alloc_pages_nodemask+0x1a1/0x7e0 [ 494.197805][ T1281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.203632][ T1281] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 494.209382][ T1281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.215634][ T1281] ? __kmalloc_node+0x3d/0x70 [ 494.220326][ T1281] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.226062][ T1281] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 494.232319][ T1281] alloc_pages_current+0x107/0x210 [ 494.237449][ T1281] push_pipe+0x3fc/0x7a0 [ 494.241710][ T1281] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 494.247354][ T1281] ? debug_check_no_obj_freed+0x200/0x464 [ 494.253084][ T1281] ? iov_iter_revert+0xaa0/0xaa0 [ 494.258033][ T1281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 494.263329][ T1281] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 494.269063][ T1281] ? iov_iter_pipe+0xba/0x2f0 17:31:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1800010, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'lo,vboxnet0:vmnet1ppp1vmnet1[%selfkeyring'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:07 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000600)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000640)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="2800000006871b24c83fa108f5610ae5798b45b5a8498fa82f927648e8d38973b04216461b8100", @ANYRES16=r3, @ANYBLOB="000025bd7000ffdbdf25130000001400090008000200000000800800020000080000"], 0x28}, 0x1, 0x0, 0x0, 0x4010}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7a3e96", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0f78ee48"]) r4 = geteuid() r5 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000500)=0xe8) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x80000, &(0x7f0000000540)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x9}}, {@seclabel='seclabel'}, {@euid_gt={'euid>', r6}}, {@subj_user={'subj_user', 0x3d, '#'}}]}}) poll(&(0x7f0000000140)=[{r1, 0x448c}], 0x1, 0x4) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x63, 0x0) [ 494.273761][ T1281] default_file_splice_read+0x199/0x890 [ 494.279322][ T1281] ? free_unref_page+0x476/0x600 [ 494.285397][ T1281] ? __put_page+0x8d/0xd0 [ 494.289737][ T1281] ? trace_hardirqs_on+0x67/0x230 [ 494.294780][ T1281] ? iter_file_splice_write+0xbe0/0xbe0 [ 494.300341][ T1281] ? __put_page+0x92/0xd0 [ 494.304688][ T1281] ? generic_pipe_buf_release+0x105/0x160 [ 494.310424][ T1281] ? direct_splice_actor+0x1a0/0x1a0 [ 494.315725][ T1281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.322010][ T1281] ? fsnotify+0x811/0xbc0 [ 494.326960][ T1281] ? fsnotify+0xbc0/0xbc0 [ 494.331307][ T1281] ? fsnotify_first_mark+0x210/0x210 [ 494.336605][ T1281] ? splice_shrink_spd+0xd0/0xd0 [ 494.341562][ T1281] ? security_file_permission+0x94/0x380 [ 494.347225][ T1281] ? iter_file_splice_write+0xbe0/0xbe0 [ 494.352796][ T1281] do_splice_to+0x12a/0x190 [ 494.357321][ T1281] splice_direct_to_actor+0x2d2/0x970 [ 494.362811][ T1281] ? generic_pipe_buf_nosteal+0x10/0x10 [ 494.368375][ T1281] ? do_splice_to+0x190/0x190 17:31:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 494.373072][ T1281] ? rw_verify_area+0x118/0x360 [ 494.378027][ T1281] do_splice_direct+0x1da/0x2a0 [ 494.383019][ T1281] ? splice_direct_to_actor+0x970/0x970 [ 494.388593][ T1281] ? rw_verify_area+0x118/0x360 [ 494.393458][ T1281] do_sendfile+0x597/0xd00 [ 494.397899][ T1281] ? do_compat_pwritev64+0x1c0/0x1c0 [ 494.406949][ T1281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 494.415466][ T1281] ? fput+0x1b/0x20 [ 494.419291][ T1281] __x64_sys_sendfile64+0x1dd/0x220 [ 494.424509][ T1281] ? __ia32_sys_sendfile+0x230/0x230 [ 494.424526][ T1281] ? do_syscall_64+0x26/0x610 [ 494.424541][ T1281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 494.424556][ T1281] ? trace_hardirqs_on+0x67/0x230 [ 494.424573][ T1281] do_syscall_64+0x103/0x610 [ 494.424593][ T1281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.424604][ T1281] RIP: 0033:0x4582b9 17:31:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fsync(r0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 494.424620][ T1281] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.424627][ T1281] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 494.488833][ T1281] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 494.496814][ T1281] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 494.504976][ T1281] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 494.512952][ T1281] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 17:31:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x64, 0x0) [ 494.520927][ T1281] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:07 executing program 1: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_NMI(r1, 0xae9a) r2 = syz_open_procfs(r0, &(0x7f0000000080)='{>\n=O#$\xc8\x04Hi\x00\xff\x8c\x80\n\xb3\x1c\xfe\x94L0\xfd\xd7\x83\xb8\xa2[I?\xe4\x84\xf0\xb7-{\x94\"ep\xdcp\r|\xf7\xb1\xe4v\xfb,\x84^ht\x00\x00\x00\x00\x00') ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x401) preadv(r2, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x27e, 0x0) 17:31:07 executing program 0 (fault-call:4 fault-nth:28): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:07 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x317) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 494.788236][ T1413] FAULT_INJECTION: forcing a failure. [ 494.788236][ T1413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 494.809376][ T1413] CPU: 0 PID: 1413 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 494.817323][ T1413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.827396][ T1413] Call Trace: [ 494.830716][ T1413] dump_stack+0x172/0x1f0 [ 494.835065][ T1413] should_fail.cold+0xa/0x15 [ 494.839670][ T1413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.845523][ T1413] ? ___might_sleep+0x163/0x280 [ 494.850396][ T1413] should_fail_alloc_page+0x50/0x60 [ 494.855604][ T1413] __alloc_pages_nodemask+0x1a1/0x7e0 [ 494.860986][ T1413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.866995][ T1413] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 494.872733][ T1413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.878984][ T1413] ? __kmalloc_node+0x3d/0x70 [ 494.883666][ T1413] ? rcu_read_lock_sched_held+0x110/0x130 [ 494.889394][ T1413] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 494.889413][ T1413] alloc_pages_current+0x107/0x210 [ 494.889431][ T1413] push_pipe+0x3fc/0x7a0 [ 494.889452][ T1413] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 494.889467][ T1413] ? debug_check_no_obj_freed+0x200/0x464 [ 494.889487][ T1413] ? iov_iter_revert+0xaa0/0xaa0 [ 494.889503][ T1413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 494.889523][ T1413] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 494.905213][ T1413] ? iov_iter_pipe+0xba/0x2f0 [ 494.905237][ T1413] default_file_splice_read+0x199/0x890 [ 494.905252][ T1413] ? free_unref_page+0x476/0x600 [ 494.905262][ T1413] ? __put_page+0x8d/0xd0 [ 494.905281][ T1413] ? trace_hardirqs_on+0x67/0x230 [ 494.905296][ T1413] ? iter_file_splice_write+0xbe0/0xbe0 [ 494.905310][ T1413] ? __put_page+0x92/0xd0 [ 494.905327][ T1413] ? generic_pipe_buf_release+0x105/0x160 [ 494.905345][ T1413] ? direct_splice_actor+0x1a0/0x1a0 [ 494.905367][ T1413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:31:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) kcmp(r1, r2, 0x3, r0, r0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10030, r0, 0x0) preadv(r0, &(0x7f0000001400), 0x0, 0xfffffffffffffffc) [ 494.921641][ T1413] ? fsnotify+0x811/0xbc0 [ 494.921662][ T1413] ? fsnotify+0xbc0/0xbc0 [ 494.921677][ T1413] ? fsnotify_first_mark+0x210/0x210 [ 494.921694][ T1413] ? splice_shrink_spd+0xd0/0xd0 [ 494.921720][ T1413] ? security_file_permission+0x94/0x380 [ 494.921739][ T1413] ? iter_file_splice_write+0xbe0/0xbe0 [ 494.921755][ T1413] do_splice_to+0x12a/0x190 [ 494.921775][ T1413] splice_direct_to_actor+0x2d2/0x970 [ 494.932789][ T1413] ? generic_pipe_buf_nosteal+0x10/0x10 [ 494.932811][ T1413] ? do_splice_to+0x190/0x190 [ 494.932830][ T1413] ? rw_verify_area+0x118/0x360 [ 494.932846][ T1413] do_splice_direct+0x1da/0x2a0 [ 494.932862][ T1413] ? splice_direct_to_actor+0x970/0x970 [ 494.932884][ T1413] ? rw_verify_area+0x118/0x360 [ 494.932901][ T1413] do_sendfile+0x597/0xd00 [ 494.932926][ T1413] ? do_compat_pwritev64+0x1c0/0x1c0 [ 494.932942][ T1413] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 494.932957][ T1413] ? fput+0x1b/0x20 [ 494.932978][ T1413] __x64_sys_sendfile64+0x1dd/0x220 [ 494.932996][ T1413] ? __ia32_sys_sendfile+0x230/0x230 [ 494.933012][ T1413] ? do_syscall_64+0x26/0x610 [ 494.933028][ T1413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 494.933053][ T1413] ? trace_hardirqs_on+0x67/0x230 [ 494.963108][ T1413] do_syscall_64+0x103/0x610 [ 494.963131][ T1413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.963142][ T1413] RIP: 0033:0x4582b9 [ 494.963156][ T1413] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.963173][ T1413] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 494.963193][ T1413] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 494.963201][ T1413] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 494.963209][ T1413] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 494.963218][ T1413] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 494.963225][ T1413] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:08 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1800010, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'lo,vboxnet0:vmnet1ppp1vmnet1[%selfkeyring'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:08 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x65, 0x0) 17:31:08 executing program 0 (fault-call:4 fault-nth:29): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:08 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x20000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f00000002c0)={0x3ff}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000580)={[0x8, 0x10000, 0x3f, 0x6, 0x4, 0xffff, 0xa00000000000000, 0xc48, 0x20, 0x0, 0x80, 0x1, 0x7, 0x0, 0x2, 0xfffffffffffffff8], 0x10d000, 0x60000}) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000540)={0xf, 0x6, 0x40, 0x4000}) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000140)={@broadcast, @broadcast, 0x0}, &(0x7f0000000180)=0xc) accept$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) accept(r0, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000400)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000780)={0x0, @loopback}, &(0x7f00000007c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000900)=0xe8) accept4$packet(r0, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b80)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'team_slave_0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000c80)={@remote, @loopback, 0x0}, &(0x7f0000000cc0)=0xc) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002500)=[{&(0x7f0000000ec0)=""/14, 0xe}, {&(0x7f0000000f00)=""/241, 0xf1}, {&(0x7f0000001000)=""/148, 0x94}, {&(0x7f00000010c0)=""/1, 0x1}, {&(0x7f0000001100)=""/158, 0x9e}, {&(0x7f00000011c0)=""/104, 0x68}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000001240)=""/64, 0x40}, {&(0x7f0000001280)=""/211, 0xd3}, {&(0x7f0000002440)=""/182, 0xb6}], 0xa, &(0x7f00000025c0)=""/130, 0x82}, 0x41) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006dc0)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000006ec0)=0xe8) getsockname$packet(r0, &(0x7f0000006f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006f40)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006f80)={'irlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006fc0)={'tunl0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000007000)={@dev, @rand_addr, 0x0}, &(0x7f0000007040)=0xc) recvmmsg(r0, &(0x7f0000007a40)=[{{0x0, 0x0, &(0x7f0000007200)=[{&(0x7f0000007140)=""/165, 0xa5}], 0x1, &(0x7f0000007240)=""/19, 0x13}, 0x1}, {{&(0x7f0000007280)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007340)=[{&(0x7f0000007300)=""/42, 0x2a}], 0x1, &(0x7f0000007380)=""/124, 0x7c}, 0x81}, {{&(0x7f0000007400)=@nfc, 0x80, &(0x7f0000007940)=[{&(0x7f0000007480)=""/9, 0x9}, {&(0x7f00000074c0)=""/93, 0x5d}, {&(0x7f0000007540)=""/37, 0x25}, {&(0x7f0000007580)=""/193, 0xc1}, {&(0x7f0000007680)=""/148, 0x94}, {&(0x7f0000007740)=""/204, 0xcc}, {&(0x7f0000007840)=""/213, 0xd5}], 0x7, &(0x7f00000079c0)=""/84, 0x54}, 0x4}], 0x3, 0x20, &(0x7f0000007b00)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007b40)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000007c40)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007c80)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000007cc0)={@dev, 0x0}, &(0x7f0000007d00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000007d40)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000085c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000008580)={&(0x7f0000007d80)={0x7fc, r1, 0x20, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0xf8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf639}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x17c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r15}, {0x208, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x1f, 0x43, 0x50, 0x100000001}, {0x1, 0x91, 0x8, 0x3f}, {0x401, 0x6, 0xdf, 0x9}, {0x0, 0x8391, 0x400, 0x3ff}, {0x1, 0x6, 0xfffffffffffffffd, 0x558}, {0x46, 0x1, 0x1, 0x7f}, {0xffffffffffffff00, 0x401, 0x3f, 0x800}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x79d7}}}]}}, {{0x8, 0x1, r18}, {0x18c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xdc4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3f5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}]}}]}, 0x7fc}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 495.462635][ T1642] FAULT_INJECTION: forcing a failure. [ 495.462635][ T1642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 495.477479][ T1642] CPU: 0 PID: 1642 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 495.485417][ T1642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.495501][ T1642] Call Trace: [ 495.495533][ T1642] dump_stack+0x172/0x1f0 [ 495.495556][ T1642] should_fail.cold+0xa/0x15 17:31:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 495.495576][ T1642] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.495596][ T1642] ? ___might_sleep+0x163/0x280 [ 495.495621][ T1642] should_fail_alloc_page+0x50/0x60 [ 495.513791][ T1642] __alloc_pages_nodemask+0x1a1/0x7e0 [ 495.513810][ T1642] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.513827][ T1642] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 495.513843][ T1642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.513864][ T1642] ? __kmalloc_node+0x3d/0x70 [ 495.513879][ T1642] ? rcu_read_lock_sched_held+0x110/0x130 [ 495.513893][ T1642] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 495.513910][ T1642] alloc_pages_current+0x107/0x210 [ 495.513929][ T1642] push_pipe+0x3fc/0x7a0 [ 495.513951][ T1642] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 495.578920][ T1642] ? debug_check_no_obj_freed+0x200/0x464 [ 495.584666][ T1642] ? iov_iter_revert+0xaa0/0xaa0 [ 495.589629][ T1642] ? lockdep_hardirqs_on+0x418/0x5d0 [ 495.589647][ T1642] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 495.589660][ T1642] ? iov_iter_pipe+0xba/0x2f0 [ 495.589684][ T1642] default_file_splice_read+0x199/0x890 17:31:08 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x66, 0x0) [ 495.610909][ T1642] ? free_unref_page+0x476/0x600 [ 495.615845][ T1642] ? __put_page+0x8d/0xd0 [ 495.615866][ T1642] ? trace_hardirqs_on+0x67/0x230 [ 495.615884][ T1642] ? iter_file_splice_write+0xbe0/0xbe0 [ 495.615901][ T1642] ? __put_page+0x92/0xd0 [ 495.615920][ T1642] ? generic_pipe_buf_release+0x105/0x160 [ 495.615939][ T1642] ? direct_splice_actor+0x1a0/0x1a0 [ 495.615954][ T1642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.615968][ T1642] ? fsnotify+0x811/0xbc0 [ 495.615987][ T1642] ? fsnotify+0xbc0/0xbc0 [ 495.616011][ T1642] ? fsnotify_first_mark+0x210/0x210 [ 495.666466][ T1642] ? splice_shrink_spd+0xd0/0xd0 [ 495.666495][ T1642] ? security_file_permission+0x94/0x380 [ 495.666514][ T1642] ? iter_file_splice_write+0xbe0/0xbe0 [ 495.666530][ T1642] do_splice_to+0x12a/0x190 [ 495.666547][ T1642] splice_direct_to_actor+0x2d2/0x970 [ 495.666564][ T1642] ? generic_pipe_buf_nosteal+0x10/0x10 [ 495.666582][ T1642] ? do_splice_to+0x190/0x190 [ 495.666601][ T1642] ? rw_verify_area+0x118/0x360 [ 495.666618][ T1642] do_splice_direct+0x1da/0x2a0 [ 495.666639][ T1642] ? splice_direct_to_actor+0x970/0x970 [ 495.693157][ T1642] ? rw_verify_area+0x118/0x360 [ 495.693195][ T1642] do_sendfile+0x597/0xd00 [ 495.693222][ T1642] ? do_compat_pwritev64+0x1c0/0x1c0 [ 495.693239][ T1642] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 495.693253][ T1642] ? fput+0x1b/0x20 [ 495.693272][ T1642] __x64_sys_sendfile64+0x1dd/0x220 [ 495.693289][ T1642] ? __ia32_sys_sendfile+0x230/0x230 [ 495.693304][ T1642] ? do_syscall_64+0x26/0x610 [ 495.693320][ T1642] ? lockdep_hardirqs_on+0x418/0x5d0 17:31:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 495.693341][ T1642] ? trace_hardirqs_on+0x67/0x230 [ 495.769389][ T1642] do_syscall_64+0x103/0x610 [ 495.774009][ T1642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.780200][ T1642] RIP: 0033:0x4582b9 [ 495.784109][ T1642] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.803748][ T1642] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:31:08 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x67, 0x0) 17:31:09 executing program 1: r0 = socket$inet6(0xa, 0xc8d272397bc9ea9f, 0x700000) readahead(r0, 0x9, 0x81) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x258, 0x0) [ 495.812280][ T1642] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 495.820360][ T1642] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 495.828439][ T1642] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 495.836431][ T1642] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 495.844437][ T1642] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1800010, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'lo,vboxnet0:vmnet1ppp1vmnet1[%selfkeyring'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0) 17:31:09 executing program 0 (fault-call:4 fault-nth:30): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:09 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x1, 0x1f}}, 0x30) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grgmp_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000140)={0x8000, 0x59455247, 0x7fffffff, 0x2, 0x3, @stepwise={{0x0, 0xfff}, {0x8, 0x4}, {0x4, 0x1}}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') syz_open_dev$sndmidi(&(0x7f0000000440)='/dev/snd/midiC#D#\x00', 0x3, 0x2000) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xa028000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 17:31:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x156, 0x0) 17:31:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:09 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x81}}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other='allow_other'}, {@blksize={'blksize'}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}]}}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400242) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x69, 0x0) [ 496.151525][ T1886] FAULT_INJECTION: forcing a failure. [ 496.151525][ T1886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.183480][ T1886] CPU: 0 PID: 1886 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 496.191430][ T1886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.201535][ T1886] Call Trace: [ 496.204853][ T1886] dump_stack+0x172/0x1f0 [ 496.209215][ T1886] should_fail.cold+0xa/0x15 [ 496.213828][ T1886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.219735][ T1886] ? ___might_sleep+0x163/0x280 [ 496.219760][ T1886] should_fail_alloc_page+0x50/0x60 [ 496.219774][ T1886] __alloc_pages_nodemask+0x1a1/0x7e0 [ 496.219790][ T1886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.219813][ T1886] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 496.247087][ T1886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.247111][ T1886] ? __kmalloc_node+0x3d/0x70 [ 496.258046][ T1886] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.263787][ T1886] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 496.270083][ T1886] alloc_pages_current+0x107/0x210 [ 496.275229][ T1886] push_pipe+0x3fc/0x7a0 [ 496.279495][ T1886] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 496.285180][ T1886] ? debug_check_no_obj_freed+0x200/0x464 [ 496.291014][ T1886] ? iov_iter_revert+0xaa0/0xaa0 [ 496.291032][ T1886] ? lockdep_hardirqs_on+0x418/0x5d0 [ 496.291046][ T1886] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 496.291059][ T1886] ? iov_iter_pipe+0xba/0x2f0 [ 496.291079][ T1886] default_file_splice_read+0x199/0x890 [ 496.291096][ T1886] ? free_unref_page+0x476/0x600 [ 496.291108][ T1886] ? __put_page+0x8d/0xd0 [ 496.291126][ T1886] ? trace_hardirqs_on+0x67/0x230 [ 496.291142][ T1886] ? iter_file_splice_write+0xbe0/0xbe0 [ 496.291159][ T1886] ? __put_page+0x92/0xd0 [ 496.291195][ T1886] ? generic_pipe_buf_release+0x105/0x160 17:31:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6a, 0x0) [ 496.291216][ T1886] ? direct_splice_actor+0x1a0/0x1a0 [ 496.317866][ T1886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.317887][ T1886] ? fsnotify+0x811/0xbc0 [ 496.317907][ T1886] ? fsnotify+0xbc0/0xbc0 [ 496.317931][ T1886] ? fsnotify_first_mark+0x210/0x210 [ 496.374469][ T1886] ? splice_shrink_spd+0xd0/0xd0 [ 496.379453][ T1886] ? security_file_permission+0x94/0x380 [ 496.379478][ T1886] ? iter_file_splice_write+0xbe0/0xbe0 [ 496.379495][ T1886] do_splice_to+0x12a/0x190 [ 496.379513][ T1886] splice_direct_to_actor+0x2d2/0x970 [ 496.379529][ T1886] ? generic_pipe_buf_nosteal+0x10/0x10 [ 496.379547][ T1886] ? do_splice_to+0x190/0x190 [ 496.379566][ T1886] ? rw_verify_area+0x118/0x360 [ 496.379583][ T1886] do_splice_direct+0x1da/0x2a0 [ 496.379598][ T1886] ? splice_direct_to_actor+0x970/0x970 [ 496.379622][ T1886] ? rw_verify_area+0x118/0x360 [ 496.379641][ T1886] do_sendfile+0x597/0xd00 [ 496.379676][ T1886] ? do_compat_pwritev64+0x1c0/0x1c0 17:31:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 496.430961][ T1886] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 496.430981][ T1886] ? fput+0x1b/0x20 [ 496.431004][ T1886] __x64_sys_sendfile64+0x1dd/0x220 [ 496.431023][ T1886] ? __ia32_sys_sendfile+0x230/0x230 [ 496.431039][ T1886] ? do_syscall_64+0x26/0x610 [ 496.431062][ T1886] ? lockdep_hardirqs_on+0x418/0x5d0 [ 496.478079][ T1886] ? trace_hardirqs_on+0x67/0x230 [ 496.483127][ T1886] do_syscall_64+0x103/0x610 [ 496.487753][ T1886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.493662][ T1886] RIP: 0033:0x4582b9 [ 496.497575][ T1886] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.517370][ T1886] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 496.525802][ T1886] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 496.533801][ T1886] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 496.533811][ T1886] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 496.533819][ T1886] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 496.533826][ T1886] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6b, 0x0) 17:31:09 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030307836a5303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f418a61d00400e2c1567570712dbffd73475f69643db0ced872043bbc502db7b78d21b6282add2280f00f6e8cc6b444a3b602b48413b61f2cdd45bf05c858a52c8c3ae903cec59cf835f67f18780e7ef8467758622a9c97c5f6459a54619620a13524dd344120dd32ea4b42756ccae7d1deab9b0c81cd87634cc79a9956d653c654db309b951480542c736123989722a02b8458fca0fb0a9162c0c6d677d3f8c1aee4e0978e61d6222f22cd17d24afe1a000bcaee4274e02ceca24e6c0bfce3fb79b62f087ec11244c82748a6394480a93977610b0bfad35d612602aa880380e4a64dbe149e14740c9fd2317702eacc1180c0ada1a80bf7462d61b677c9618fbc6740bd6452d60d04876e8321de97849fc663170befaf85b5fdb4de8943a4060041decd49bab4801f59f10e1b59670f156f03fae869f542129fc878020b00f964f110566a34625a9b08453e3fbcb0f82883922410d76363b36ee57896c294cfab51a05b9c140637e504e083096b097bfe2e6133cdbcffe0af19bffc8175466fa88d367641e177c585f4ab9fbcfd6a061b5a696609b442e370bca265fe78d8f941bf9661a416adf5c6951d2147c182f9093246e9eeed89994110c90e6955a088a92ec468c29dfc94dfce15cf305f039713824ec73b6ba1cf6554b6dcce9c6e5aac1c3ccf1c6ccf7222f5e128033fc0dd3cb59fd33642a335d389801003e67d6e365a6c8cd7c35304d0", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1182) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) epoll_create1(0x80000) socket$rds(0x15, 0x5, 0x0) 17:31:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:10 executing program 1: exit(0x40) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x9, 0x1, 0x9, 0x7fffffff, 0x1}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={r2, 0x9a, "2febe5a197871685cc7b5707326b47d411de20ca81d14d8aa7425c2bcab3bd80d8ceb6c273b6b9058028c16f6b1764bf5c2b458fb200d7c470f3f91cde8e465e8416db52bf1504c0159cf5eeee1cadd1002a9e704a5fac0b1480f6bb236c18db3ec662143c4b8934778bd08da65b80e3db9fc85fe7de17811033ebc1bf4480dede91496cb166b42960253a15186ebe28fc90e34824853f3dbaf8"}, &(0x7f0000000180)=0xa2) signalfd4(r0, &(0x7f00000001c0)={0x63}, 0x8, 0x80800) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:10 executing program 0 (fault-call:4 fault-nth:31): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:10 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6c, 0x0) 17:31:10 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:10 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365727f69643d449561c9bd068ca4c0588bef49d4c698de5b2052ba", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) fcntl$getownex(r0, 0x10, &(0x7f00000019c0)={0x0, 0x0}) r3 = geteuid() lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001ac0)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000001bc0)=0xe8) fstat(r0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001c80)={0x0, 0x0}) getresuid(&(0x7f0000001cc0), &(0x7f0000001d00)=0x0, &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001d80)={0x0, 0x0, 0x0}, &(0x7f0000001dc0)=0xc) r11 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001e00)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001f00)=0xe8) fstat(r0, &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() stat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002480)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002440)='security!GPL*em1\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000025c0)=0xe8) r19 = getegid() r20 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000026c0), &(0x7f0000002700), &(0x7f0000002740)=0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000002780)=0x0) r24 = getuid() fstat(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getpgid(0xffffffffffffffff) fstat(r0, &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940)={0x0}, &(0x7f0000002980)=0xc) getresuid(&(0x7f00000029c0), &(0x7f0000002a00)=0x0, &(0x7f0000002a40)) r31 = getegid() sendmmsg$unix(r1, &(0x7f0000006640)=[{&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001900)=[{&(0x7f0000000240)="2777411b02ea3562797be8705be35b", 0xf}, {&(0x7f00000003c0)="59bffc1a85b0fde240d1a4e6ff9cb440a5ab373ddacc5ef93c11385509302c622ba8c19cb632bc5964db07422247afa5b7dc93b00d81fdcb65dcdfa2186a3f818784b5b469c6b76212cf6499fb85d298a9111760c2b9f381a4eb45999defa661d200f23a997c848553c61c9413f79e2fdbaccde15966a057afe6b5d2e491", 0x7e}, {&(0x7f0000000440)="5d8bd989e881d972a487eb9e96cd6d6117e08141f113432a2a4da9622c59c7acc229182b398a428e7c23b4fb205daf33a036a17827557d7e93c5cca52acc3b2d4dc11e49e3114532a892e3d203", 0x4d}, {&(0x7f00000004c0)="499b40e3237e2457d1fb7123df1d10bd808b29dd80ca46c81591ff1a41ed09f078a2cb51ae87de393b1d52de1c520ae7fdbd67e9ad3a73bca706bc887241a944eedd1d614732f6ec73178dd4ec264d82b57545a6306ce7a36bd6a018a72dc042f9be441dfec0a9f05d127bd48408757b2fb0d291f147cdfbc5df77b69bb907bcf326841abea6b1e3c9ac33366ae07fb5e6e033cc922c1577", 0x98}, {&(0x7f0000000580)="d85ecce31672d4287d3cb2580ed4d61f7a9165d4894739a5a5ad6a702c562bc2b13f161ff1fe476deb9e3d3ca0f82b001f650e6782d70e89f402e95de0b8d1f6236248e2f185ccea", 0x48}, {&(0x7f0000000600)="ec0b4c8315cbbc78e89e7d75fd3a578276cf396c6762e3c22d12284c66fb1c5674ee51fd6efcbf4588f60a6f33ec1737396f064bbed6a87a40725da9b9b225aa555827a67cfa6ed984fb53b20d71d6049710e1d06fbbb79631e78cb0dfe55f34926544def5805725866401c894920a9fd5912ac93aab04fa8d19af1081c97d51f3412b4436165d12b1b86e8f6e61f41ba15ddd32798afbfc4a907e19e5350b6c2f3d57a83b0b6a1912c7b80dac3518a1e78287b0abcfeaaa862bed23bbff2a8c6826afdb1d7905c0f78cd70e8b5b39", 0xcf}, {&(0x7f0000000700)="1516f96729361db11df84727a278d04d0cf8442cf1c19ea4a6b3b133a201500c05912786f2fdb7789937d142e7848d4925516e", 0x33}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="371c4d80f79998f318f033fbdf977b04fc70475a34bf964537b372ecfcdf9b931f28b0bf1f0a440b1f81f5e73ba69db82a9f3884079714fff0bd09a0e03dae607aa5cbb5cae2db08eea548e2f3b21d3756f92ef7d5a3aca416b3f2a01fd9dbb054f4945ffe950185c27310cbc9fd67c909af806a694446a3d01d2b6f7da5555850008f3dc7308cb01d074f9e127d5a2bfabc6ec3ec83bb08289513b392e48ecabd0f71bbb6271857a38b5e456a1b34c170f0909c617edc4919de4628a61bc098ace4137590e4688a39093c43958619638c8782a2c0a88647507d2c766ddb49141a1d", 0xe2}, {&(0x7f0000001840)="09de2b4f7ac6a41290bc880b8ff0fc920dde4c6d8893149ea369f5db655d57e63f5bc5e02c568ae063d652d5def8f2afaa35949d578a826f5f878a5bc0791f49df826ef1b34d848499a84e7cfde73ec9320e7b1b418897c5650c5a519e7b131864c94a134f8308f19a5d2dc184d539db6a136a71f751d9ebb4fd817ef8a6a1652e27f32886e679325f3af967d253ccae0c4086a3d21dc29221d1c4ad9cf11e7af6dfc6e1fe0bb68a04c0881060e2baee84caf0d1d483850de9c649", 0xbb}], 0xa, &(0x7f0000006900)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="600000001900010000000000026fe6d6408e2b9f73d5000000c5b0a263c7b2b8f877c00775016ccd0e8a9ad9566f97ccdc1a70f294f457e4bf4abfbac699707c2b9f98fd", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000006c1f3967975f5ae9b5030050e070b0ebd2c93666cf72739cf9198a31e9eed84b760942158ad31a817b723f54c66e6b1ca9f8de8b2c5be7006c1385f71b90c652cf53d2e84d2422ee9162f5c3e715ff31f017beb3f700c079f4e5eab0d304002228a2f5bb5abafc707443eacc57"], 0xd0, 0x40000}, {&(0x7f00000020c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000022c0)=[{&(0x7f0000002140)="7c6718caf25048c05fb2625d4bf62c4b7d94490f04cdd2745e2c5ba5f2307167b9faf1c652db61fc745ea79b72e259cef25a21189173d7f3185f0799b9596930dafc63e620f8", 0x46}, {&(0x7f00000021c0)="d083ea9eecf439643b2ddb15ad9dc98cb9951ab677382b201c420438d9765f281e6e1cfff953b8a0897d028b74a75f7d78b00c798d6c656aa288615320220bf3740ccb315c6ce0d098203e9a38c5afcef180c03f1d7ec0e3dd17240f900d193b7198a8900d7c2027ceb37a3a8ac9fe99d4b0262e006faa13c013bf00c59cc4af7060b348a693cd2d0439761f04e6078a34c9ce9fdbd2d34f69e0cb9bd6c8898189dea87f620850ef37ef18749c485e7cf54665abafb18d055973e511b538a23f2b5d78e5fd58f23b57cc7622d88fa3853fdfb9e72b59039e53734201b3770708fc83e5286290f9f214ba6be59cbbe46b6512f41ff77c", 0xf6}], 0x2, &(0x7f0000002a80)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x118, 0x4044044}, {&(0x7f0000002bc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000002c40)="2604a217365ce74c896204eeb168830478132f3daccbfc989baa65ed61af0a6cb015f073cae512847b331a4d64ba53050045b9c53bdca3f68e2e42f8bc323b666bfd1fdc04e6af35c4d0e86676dc90a3a3176609e5309e6467c4079b7bfcfaec1737ef014ce9d21fec44a62d9948ecba0427383c893b8dfe5f72355c0dd255bf110476f5c46797bc0fb09652484935ba7c7b7e7927604bbe57f46e", 0x9b}, {&(0x7f0000002d00)="4281cf6c77259c3a2797879d35f800f7eca1fb0102920baa0b56fdeac0d108b4c01a639be6b4ef740e19fce2d0f1f0ac01bc16f2", 0x34}, {&(0x7f0000002d40)="91452ac4156313458224bff766bc33e7e9a773f14e8459784e346b0cdd28ca16c2c4f4bd9d9fbdcbff855f920384bfbeb4811420455fc864be2ce63b01d77567a03db3e8602a8e703b462b84db1c802ce4ba150c37f2c46957f6701760c77e782358f895306bbd8d9017cbeafd9dab0192a9191867bee57e", 0x78}], 0x3, 0x0, 0x0, 0x800}, {&(0x7f0000002e00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000004000)=[{&(0x7f0000002e80)="5ffbfaea0a4a037fec06e10fef0c0eb3f11ebb41db7647ea8c9ccde97ceb83e6aec6b5d66cf897cfb53516f25db2a28bc85bea269bd101c8468746fa1caf1fa7b426c6753464f6fb0c758dd9971602c506d7a496f767c11d1ede2142ba7007b040bc23e984d6cb02c2a2dd27d89c1ffb121ed16d1112849e61919072050264f993d032b06021862979e7aa5397e265636edc7ce4d0018ad103940dd0a801397e314d0b6c8e9183", 0xa7}, {&(0x7f0000002f40)="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", 0x1000}, {&(0x7f0000003f40)="8ec4d718c8d5b3922949a7d0eab70cde66160adc019099034892d03c7feaa1d62b5e7f34e3274ceb04bd9a9dbdcf8d4c99574849a0b60962a75b3024b1cde758dfa96065e90f2d96dae8fe0cc587a51a43609e2683a500c2769134407685628e659a7736406686ddb1628df2fe85c4d996486ae5b25e52a73e55b1286ce284038e0979005b3fc33cc2f40b562c8208db52fac43da32c632049a337cade1edaf586e3d4c09f1548ec2ef268e010ab1a7eb0ec2f76bd", 0xb5}, {&(0x7f00000050c0)="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", 0x1000}], 0x4, &(0x7f0000004040)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x50, 0x4040}, {&(0x7f00000060c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000065c0)=[{&(0x7f0000006140)="917ce691f998a3bcf89b54f56757ac2e70b692dc20a1709852d42937bffc17ba81f32d0f52b236dcd4ed86f325272f42cd1b57d17ed8c8a1dccdf93518c6cd59918360005fd555365dd23b677e8de051941e1a96684112f780cbd679bc3266ae37dfb39e170b811b0b0bdca75baad798b23a3233ce42878b7dd2d3105a18649b6cba34137409a173da6a291b7a189914b2af4ff84a67fb394724cc093cf9a89f281dc7c6ccaa8d688a1df072511cb89fccc044c971e112883d601bcc942b", 0xbe}, {&(0x7f0000006200)="138b4cf0cd6907d0ed4e094a5bc9a7f03bfd194e2f15425a6a4be6a1bd8dd37f4fed7a2933b514466890c1961429bc6893690afbc963c030c2b756c0cdac8d3030a87dacf0dfaf5547a9b82051c50b07d4cbbc0a4000823100a637c6bfa81a8e1352ab8581ee1db8840de01929d4b23d8d85dbbea5d06030872b9767038c204acc26f91aaa553f8ffd8f6d0f27575c36ea29d79af09ddb14593bc0492ba6c98be61c845472844f57b6e89e1df86fb96a2561940b3df5bc01e2ff02f0f17b6dc9736f44459e", 0xc5}, {&(0x7f0000006300)="3a28edbf3a1eb0891719b70a43fa0f664ee2a086d8c5885e79bc58358b95a15fa7db58ffa6694e93d89d5af817204ae3b18b89ef63925dc1e838f7d7e096d6e58b8d21a3414424386ca06da3eaf1c381e21c5bc04d5a1901ffcc10e5c151a3032c11db295aae2cafdf885c617974f9ea65fd08e1ed86caba5868c468d8dc343a5032063a399b5a90a9ff97420e19d26fa75adf11aef4b83dc0aa44", 0x9b}, {&(0x7f00000063c0)="af78880142d3879659243955acc0e82adaf5881bd8e10eba633291fc3fcc606d56c9d15822bf4d04a5a78056636a98831d7882baaacf68e5e9d91c7b226f3dad9577694ea317f55917801dc33c25c50ad62380eea79b35b3f1ac9735b347411ac9a987d5242a1f3449892144ed1d0d401719947040b48d93af34e918788c5f7958e1a1b5602d662a5aa6780f259a4882156c3621978a6655a02e4777b5657a322c56bf58e733c7fc4597f41c06395e6b14a9b89ce73a07ddb1de6d801577455ecb2eabfd96735a610cc951f81777e0fb99c7d0364ed4d2fad64a76a65407efe2fe17dad84e259a8d538bff21d9a67a601995551d", 0xf4}, {&(0x7f00000064c0)="33616e1cf6ef64ab15e9bfbeb0a53ada55e4f33adaf974f66d4f19c46ea2ff615b16a812b37edf76fc70428649b2ec0acb22f79c9bf7092f209d19802818ef6bdb34d650fd02534947d964223adafc9573edbda4d9856270c0de961da01462c010e72ad2c949be13e2c35a306007d070e7f07e3273f45917a14a50d51f3d27b6407e16af1b5f97734dd015a9027f680beaca995ec1b269293b8eb11d61fe8cd32fb541c3fc63971e97d9cc54d53f90f91fbfc58fdb82f25b36330e55c248d8af34c6b8073961a574aa064fd1a65c2158b766c8f8248b587154c419114b", 0xdd}], 0x5, 0x0, 0x0, 0x40000}], 0x5, 0x50) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r32 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r32, 0x84, 0x6e, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e22, @loopback}], 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:10 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6d, 0x0) [ 496.999420][ T2035] FAULT_INJECTION: forcing a failure. [ 496.999420][ T2035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.023131][ T2035] CPU: 0 PID: 2035 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 497.031089][ T2035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.041155][ T2035] Call Trace: [ 497.044488][ T2035] dump_stack+0x172/0x1f0 [ 497.048844][ T2035] should_fail.cold+0xa/0x15 [ 497.053452][ T2035] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.053470][ T2035] ? ___might_sleep+0x163/0x280 [ 497.053490][ T2035] should_fail_alloc_page+0x50/0x60 [ 497.053504][ T2035] __alloc_pages_nodemask+0x1a1/0x7e0 [ 497.053517][ T2035] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.053533][ T2035] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 497.053547][ T2035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.053564][ T2035] ? __kmalloc_node+0x3d/0x70 [ 497.053580][ T2035] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.053601][ T2035] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 497.080652][ T2035] alloc_pages_current+0x107/0x210 [ 497.080675][ T2035] push_pipe+0x3fc/0x7a0 [ 497.080698][ T2035] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 497.080713][ T2035] ? debug_check_no_obj_freed+0x200/0x464 [ 497.080734][ T2035] ? iov_iter_revert+0xaa0/0xaa0 [ 497.097462][ T2035] ? lockdep_hardirqs_on+0x418/0x5d0 [ 497.097481][ T2035] ? __sanitizer_cov_trace_cmp4+0x16/0x20 17:31:10 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6e, 0x0) [ 497.097496][ T2035] ? iov_iter_pipe+0xba/0x2f0 [ 497.097518][ T2035] default_file_splice_read+0x199/0x890 [ 497.097535][ T2035] ? free_unref_page+0x476/0x600 [ 497.097555][ T2035] ? __put_page+0x8d/0xd0 [ 497.109624][ T2035] ? trace_hardirqs_on+0x67/0x230 [ 497.109645][ T2035] ? iter_file_splice_write+0xbe0/0xbe0 [ 497.109663][ T2035] ? __put_page+0x92/0xd0 [ 497.109681][ T2035] ? generic_pipe_buf_release+0x105/0x160 [ 497.109699][ T2035] ? direct_splice_actor+0x1a0/0x1a0 [ 497.109722][ T2035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.198383][ T2035] ? fsnotify+0x811/0xbc0 [ 497.202730][ T2035] ? fsnotify+0xbc0/0xbc0 [ 497.207078][ T2035] ? fsnotify_first_mark+0x210/0x210 [ 497.212383][ T2035] ? splice_shrink_spd+0xd0/0xd0 [ 497.217345][ T2035] ? security_file_permission+0x94/0x380 [ 497.223085][ T2035] ? iter_file_splice_write+0xbe0/0xbe0 [ 497.228740][ T2035] do_splice_to+0x12a/0x190 [ 497.233260][ T2035] splice_direct_to_actor+0x2d2/0x970 [ 497.238649][ T2035] ? generic_pipe_buf_nosteal+0x10/0x10 [ 497.244221][ T2035] ? do_splice_to+0x190/0x190 17:31:10 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x6f, 0x0) [ 497.248958][ T2035] ? rw_verify_area+0x118/0x360 [ 497.253815][ T2035] do_splice_direct+0x1da/0x2a0 [ 497.258679][ T2035] ? splice_direct_to_actor+0x970/0x970 [ 497.264281][ T2035] ? rw_verify_area+0x118/0x360 [ 497.269389][ T2035] do_sendfile+0x597/0xd00 [ 497.273844][ T2035] ? do_compat_pwritev64+0x1c0/0x1c0 [ 497.279142][ T2035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 497.285384][ T2035] ? fput+0x1b/0x20 [ 497.289233][ T2035] __x64_sys_sendfile64+0x1dd/0x220 [ 497.294441][ T2035] ? __ia32_sys_sendfile+0x230/0x230 [ 497.299734][ T2035] ? do_syscall_64+0x26/0x610 [ 497.304429][ T2035] ? lockdep_hardirqs_on+0x418/0x5d0 [ 497.309737][ T2035] ? trace_hardirqs_on+0x67/0x230 [ 497.314780][ T2035] do_syscall_64+0x103/0x610 [ 497.319387][ T2035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.325288][ T2035] RIP: 0033:0x4582b9 [ 497.329217][ T2035] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:10 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x70, 0x0) 17:31:10 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='8*']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = dup2(r0, r0) ioctl$KVM_NMI(r1, 0xae9a) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x2000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:10 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 497.348831][ T2035] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 497.357362][ T2035] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 497.365715][ T2035] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 497.373767][ T2035] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 497.381744][ T2035] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 497.389748][ T2035] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:11 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') bind$isdn(r1, &(0x7f0000000040)={0x22, 0x5b0d, 0x5, 0xbe1b, 0x8}, 0x6) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000280)={0x4, 0x17, &(0x7f0000000240)="6eecc5e49302deedbb7e1c74305d987c01840770366bac"}) finit_module(r1, &(0x7f0000000340)='vmnet1\x00', 0x1) preadv(r1, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/87, 0xfffffffffffffd6f}], 0x1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r1, 0x10, &(0x7f0000000080)={&(0x7f0000000140)=""/120, 0x78, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=r2, 0x4) 17:31:11 executing program 0 (fault-call:4 fault-nth:32): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:11 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x71, 0x0) 17:31:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c7281c08b63b110c50630302d3230303030303030303030303030f6d7303030302c757365725f69643dd4c44cea2656db7630643b26dfd541eb88615db11ea739fdd63a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 497.906422][ T2184] FAULT_INJECTION: forcing a failure. [ 497.906422][ T2184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.925947][ T2184] CPU: 0 PID: 2184 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 497.933934][ T2184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.944005][ T2184] Call Trace: [ 497.947327][ T2184] dump_stack+0x172/0x1f0 [ 497.951691][ T2184] should_fail.cold+0xa/0x15 17:31:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x30100, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 17:31:11 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x72, 0x0) [ 497.956294][ T2184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.962121][ T2184] ? ___might_sleep+0x163/0x280 [ 497.967005][ T2184] should_fail_alloc_page+0x50/0x60 [ 497.972224][ T2184] __alloc_pages_nodemask+0x1a1/0x7e0 [ 497.977610][ T2184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.983469][ T2184] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 497.989232][ T2184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.995497][ T2184] ? __kmalloc_node+0x3d/0x70 [ 497.995517][ T2184] ? rcu_read_lock_sched_held+0x110/0x130 [ 497.995532][ T2184] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 497.995548][ T2184] alloc_pages_current+0x107/0x210 [ 497.995565][ T2184] push_pipe+0x3fc/0x7a0 [ 497.995588][ T2184] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 497.995602][ T2184] ? debug_check_no_obj_freed+0x200/0x464 [ 497.995623][ T2184] ? iov_iter_revert+0xaa0/0xaa0 [ 497.995639][ T2184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 497.995660][ T2184] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 498.012302][ T2184] ? iov_iter_pipe+0xba/0x2f0 [ 498.012326][ T2184] default_file_splice_read+0x199/0x890 [ 498.012343][ T2184] ? free_unref_page+0x476/0x600 [ 498.012354][ T2184] ? __put_page+0x8d/0xd0 [ 498.012381][ T2184] ? trace_hardirqs_on+0x67/0x230 [ 498.043298][ T2184] ? iter_file_splice_write+0xbe0/0xbe0 [ 498.043319][ T2184] ? __put_page+0x92/0xd0 [ 498.043338][ T2184] ? generic_pipe_buf_release+0x105/0x160 [ 498.043357][ T2184] ? direct_splice_actor+0x1a0/0x1a0 [ 498.043373][ T2184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.043388][ T2184] ? fsnotify+0x811/0xbc0 [ 498.043408][ T2184] ? fsnotify+0xbc0/0xbc0 [ 498.064323][ T2184] ? fsnotify_first_mark+0x210/0x210 [ 498.064344][ T2184] ? splice_shrink_spd+0xd0/0xd0 [ 498.064371][ T2184] ? security_file_permission+0x94/0x380 [ 498.064390][ T2184] ? iter_file_splice_write+0xbe0/0xbe0 [ 498.064405][ T2184] do_splice_to+0x12a/0x190 [ 498.064422][ T2184] splice_direct_to_actor+0x2d2/0x970 [ 498.064438][ T2184] ? generic_pipe_buf_nosteal+0x10/0x10 [ 498.064457][ T2184] ? do_splice_to+0x190/0x190 [ 498.064475][ T2184] ? rw_verify_area+0x118/0x360 [ 498.064491][ T2184] do_splice_direct+0x1da/0x2a0 [ 498.064508][ T2184] ? splice_direct_to_actor+0x970/0x970 [ 498.064531][ T2184] ? rw_verify_area+0x118/0x360 [ 498.064549][ T2184] do_sendfile+0x597/0xd00 [ 498.064574][ T2184] ? do_compat_pwritev64+0x1c0/0x1c0 [ 498.111105][ T2184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 498.111124][ T2184] ? fput+0x1b/0x20 [ 498.111147][ T2184] __x64_sys_sendfile64+0x1dd/0x220 [ 498.111183][ T2184] ? __ia32_sys_sendfile+0x230/0x230 17:31:11 executing program 0 (fault-call:4 fault-nth:33): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:11 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x480, 0x0) poll(&(0x7f0000000280)=[{r0, 0x4080}, {r0, 0x2086}, {r0, 0x200}, {r0, 0xc634fe5bdd329939}, {r0, 0x2000}], 0x5, 0x5) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000140)=""/227, &(0x7f0000000240)=0xe3) 17:31:11 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x73, 0x0) [ 498.121404][ T2184] ? do_syscall_64+0x26/0x610 [ 498.121423][ T2184] ? lockdep_hardirqs_on+0x418/0x5d0 [ 498.121447][ T2184] ? trace_hardirqs_on+0x67/0x230 [ 498.132626][ T2184] do_syscall_64+0x103/0x610 [ 498.132650][ T2184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.132663][ T2184] RIP: 0033:0x4582b9 [ 498.132677][ T2184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:11 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 498.132685][ T2184] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 498.132706][ T2184] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 498.152987][ T2184] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 498.152997][ T2184] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 498.153006][ T2184] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 498.153020][ T2184] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:11 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 498.412353][ T2301] FAULT_INJECTION: forcing a failure. [ 498.412353][ T2301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 498.482619][ T2301] CPU: 0 PID: 2301 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 498.490571][ T2301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.500648][ T2301] Call Trace: [ 498.503969][ T2301] dump_stack+0x172/0x1f0 [ 498.508331][ T2301] should_fail.cold+0xa/0x15 [ 498.512943][ T2301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.518801][ T2301] ? ___might_sleep+0x163/0x280 [ 498.523683][ T2301] should_fail_alloc_page+0x50/0x60 [ 498.529006][ T2301] __alloc_pages_nodemask+0x1a1/0x7e0 [ 498.534395][ T2301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.540228][ T2301] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 498.545955][ T2301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.552223][ T2301] ? __kmalloc_node+0x3d/0x70 [ 498.556926][ T2301] ? rcu_read_lock_sched_held+0x110/0x130 [ 498.562663][ T2301] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 498.569094][ T2301] alloc_pages_current+0x107/0x210 [ 498.574221][ T2301] push_pipe+0x3fc/0x7a0 [ 498.574247][ T2301] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 498.574262][ T2301] ? debug_check_no_obj_freed+0x200/0x464 [ 498.574282][ T2301] ? iov_iter_revert+0xaa0/0xaa0 [ 498.574298][ T2301] ? lockdep_hardirqs_on+0x418/0x5d0 [ 498.574313][ T2301] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 498.574326][ T2301] ? iov_iter_pipe+0xba/0x2f0 [ 498.574345][ T2301] default_file_splice_read+0x199/0x890 [ 498.574361][ T2301] ? free_unref_page+0x476/0x600 [ 498.574372][ T2301] ? __put_page+0x8d/0xd0 [ 498.574390][ T2301] ? trace_hardirqs_on+0x67/0x230 [ 498.574411][ T2301] ? iter_file_splice_write+0xbe0/0xbe0 [ 498.584827][ T2301] ? __put_page+0x92/0xd0 [ 498.584848][ T2301] ? generic_pipe_buf_release+0x105/0x160 [ 498.584867][ T2301] ? direct_splice_actor+0x1a0/0x1a0 [ 498.584880][ T2301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.584894][ T2301] ? fsnotify+0x811/0xbc0 [ 498.584912][ T2301] ? fsnotify+0xbc0/0xbc0 [ 498.584928][ T2301] ? fsnotify_first_mark+0x210/0x210 [ 498.584943][ T2301] ? splice_shrink_spd+0xd0/0xd0 17:31:11 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:11 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x74, 0x0) 17:31:11 executing program 0 (fault-call:4 fault-nth:34): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000000c0)={0x3}) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x2) [ 498.584967][ T2301] ? security_file_permission+0x94/0x380 [ 498.584986][ T2301] ? iter_file_splice_write+0xbe0/0xbe0 [ 498.585001][ T2301] do_splice_to+0x12a/0x190 [ 498.585022][ T2301] splice_direct_to_actor+0x2d2/0x970 [ 498.595668][ T2301] ? generic_pipe_buf_nosteal+0x10/0x10 [ 498.595689][ T2301] ? do_splice_to+0x190/0x190 [ 498.595709][ T2301] ? rw_verify_area+0x118/0x360 [ 498.595726][ T2301] do_splice_direct+0x1da/0x2a0 [ 498.595746][ T2301] ? splice_direct_to_actor+0x970/0x970 [ 498.611429][ T2301] ? rw_verify_area+0x118/0x360 [ 498.611449][ T2301] do_sendfile+0x597/0xd00 [ 498.611475][ T2301] ? do_compat_pwritev64+0x1c0/0x1c0 [ 498.611491][ T2301] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 498.611506][ T2301] ? fput+0x1b/0x20 [ 498.611527][ T2301] __x64_sys_sendfile64+0x1dd/0x220 [ 498.611544][ T2301] ? __ia32_sys_sendfile+0x230/0x230 [ 498.611560][ T2301] ? do_syscall_64+0x26/0x610 [ 498.611581][ T2301] ? lockdep_hardirqs_on+0x418/0x5d0 [ 498.622058][ T2301] ? trace_hardirqs_on+0x67/0x230 [ 498.622080][ T2301] do_syscall_64+0x103/0x610 [ 498.622102][ T2301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.631446][ T2301] RIP: 0033:0x4582b9 [ 498.631463][ T2301] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.631471][ T2301] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 498.631485][ T2301] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 498.631493][ T2301] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:12 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = semget(0x2, 0x3, 0xf1) semctl$GETPID(r1, 0x3, 0xb, &(0x7f00000003c0)=""/182) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r2 = msgget$private(0x0, 0x620) msgctl$IPC_RMID(r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x109000, 0x8) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000140)={0x1, 0x0, &(0x7f0000ffa000/0x3000)=nil}) accept4$rose(r3, 0x0, &(0x7f0000000180), 0x0) [ 498.631501][ T2301] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 498.631509][ T2301] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 498.631517][ T2301] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:12 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x75, 0x0) [ 498.987662][ T2428] FAULT_INJECTION: forcing a failure. [ 498.987662][ T2428] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.011059][ T2428] CPU: 1 PID: 2428 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 499.018997][ T2428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.029074][ T2428] Call Trace: [ 499.032401][ T2428] dump_stack+0x172/0x1f0 [ 499.036760][ T2428] should_fail.cold+0xa/0x15 [ 499.041403][ T2428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.047229][ T2428] ? ___might_sleep+0x163/0x280 [ 499.052097][ T2428] should_fail_alloc_page+0x50/0x60 [ 499.057313][ T2428] __alloc_pages_nodemask+0x1a1/0x7e0 [ 499.062711][ T2428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.068534][ T2428] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 499.074259][ T2428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.080517][ T2428] ? __kmalloc_node+0x3d/0x70 [ 499.085208][ T2428] ? rcu_read_lock_sched_held+0x110/0x130 [ 499.090939][ T2428] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 499.097210][ T2428] alloc_pages_current+0x107/0x210 [ 499.102339][ T2428] push_pipe+0x3fc/0x7a0 [ 499.106579][ T2428] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 499.112210][ T2428] ? debug_check_no_obj_freed+0x200/0x464 [ 499.117941][ T2428] ? iov_iter_revert+0xaa0/0xaa0 [ 499.122881][ T2428] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.128196][ T2428] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 499.133913][ T2428] ? iov_iter_pipe+0xba/0x2f0 [ 499.138600][ T2428] default_file_splice_read+0x199/0x890 [ 499.144230][ T2428] ? free_unref_page+0x476/0x600 [ 499.149159][ T2428] ? __put_page+0x8d/0xd0 [ 499.153494][ T2428] ? trace_hardirqs_on+0x67/0x230 [ 499.158521][ T2428] ? iter_file_splice_write+0xbe0/0xbe0 [ 499.164088][ T2428] ? __put_page+0x92/0xd0 [ 499.168446][ T2428] ? generic_pipe_buf_release+0x105/0x160 [ 499.174181][ T2428] ? direct_splice_actor+0x1a0/0x1a0 [ 499.179592][ T2428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.185823][ T2428] ? fsnotify+0x811/0xbc0 [ 499.190146][ T2428] ? fsnotify+0xbc0/0xbc0 [ 499.194478][ T2428] ? fsnotify_first_mark+0x210/0x210 [ 499.199771][ T2428] ? splice_shrink_spd+0xd0/0xd0 [ 499.204723][ T2428] ? security_file_permission+0x94/0x380 [ 499.210364][ T2428] ? iter_file_splice_write+0xbe0/0xbe0 [ 499.215927][ T2428] do_splice_to+0x12a/0x190 [ 499.220715][ T2428] splice_direct_to_actor+0x2d2/0x970 [ 499.226117][ T2428] ? generic_pipe_buf_nosteal+0x10/0x10 [ 499.231684][ T2428] ? do_splice_to+0x190/0x190 [ 499.236406][ T2428] ? rw_verify_area+0x118/0x360 [ 499.241254][ T2428] do_splice_direct+0x1da/0x2a0 [ 499.246101][ T2428] ? splice_direct_to_actor+0x970/0x970 [ 499.251811][ T2428] ? rw_verify_area+0x118/0x360 [ 499.256651][ T2428] do_sendfile+0x597/0xd00 [ 499.261058][ T2428] ? do_compat_pwritev64+0x1c0/0x1c0 [ 499.266329][ T2428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 499.272562][ T2428] __x64_sys_sendfile64+0x1dd/0x220 [ 499.277790][ T2428] ? __ia32_sys_sendfile+0x230/0x230 [ 499.283070][ T2428] ? do_syscall_64+0x26/0x610 [ 499.287737][ T2428] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.293010][ T2428] ? trace_hardirqs_on+0x67/0x230 [ 499.298026][ T2428] do_syscall_64+0x103/0x610 [ 499.302605][ T2428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.308484][ T2428] RIP: 0033:0x4582b9 [ 499.312378][ T2428] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) [ 499.331995][ T2428] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 499.340407][ T2428] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 499.348381][ T2428] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 499.356355][ T2428] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 499.364307][ T2428] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 499.372258][ T2428] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:12 executing program 0 (fault-call:4 fault-nth:35): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:12 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x76, 0x0) 17:31:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400), 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000140), 0x4) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='net/kcm\x00\b\x00', 0xa, 0x3) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000200)=[0x8, 0x9]) [ 499.590900][ T2656] FAULT_INJECTION: forcing a failure. [ 499.590900][ T2656] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 499.612884][ T2656] CPU: 1 PID: 2656 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 499.620843][ T2656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.630944][ T2656] Call Trace: [ 499.634255][ T2656] dump_stack+0x172/0x1f0 [ 499.638596][ T2656] should_fail.cold+0xa/0x15 [ 499.643281][ T2656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.649102][ T2656] ? ___might_sleep+0x163/0x280 [ 499.653950][ T2656] should_fail_alloc_page+0x50/0x60 [ 499.659148][ T2656] __alloc_pages_nodemask+0x1a1/0x7e0 [ 499.664538][ T2656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.670373][ T2656] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 499.676087][ T2656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.682324][ T2656] ? __kmalloc_node+0x3d/0x70 [ 499.686996][ T2656] ? rcu_read_lock_sched_held+0x110/0x130 [ 499.692749][ T2656] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 499.699005][ T2656] alloc_pages_current+0x107/0x210 [ 499.704132][ T2656] push_pipe+0x3fc/0x7a0 [ 499.708383][ T2656] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 499.714010][ T2656] ? debug_check_no_obj_freed+0x200/0x464 [ 499.719738][ T2656] ? iov_iter_revert+0xaa0/0xaa0 [ 499.724681][ T2656] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.729988][ T2656] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 499.735722][ T2656] ? iov_iter_pipe+0xba/0x2f0 17:31:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 499.740495][ T2656] default_file_splice_read+0x199/0x890 [ 499.746774][ T2656] ? free_unref_page+0x476/0x600 [ 499.751757][ T2656] ? __put_page+0x8d/0xd0 [ 499.756136][ T2656] ? trace_hardirqs_on+0x67/0x230 [ 499.761396][ T2656] ? iter_file_splice_write+0xbe0/0xbe0 [ 499.767314][ T2656] ? __put_page+0x92/0xd0 [ 499.771670][ T2656] ? generic_pipe_buf_release+0x105/0x160 [ 499.777435][ T2656] ? direct_splice_actor+0x1a0/0x1a0 [ 499.782835][ T2656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.789097][ T2656] ? fsnotify+0x811/0xbc0 [ 499.793531][ T2656] ? fsnotify+0xbc0/0xbc0 [ 499.797880][ T2656] ? fsnotify_first_mark+0x210/0x210 [ 499.803161][ T2656] ? splice_shrink_spd+0xd0/0xd0 [ 499.808115][ T2656] ? security_file_permission+0x94/0x380 [ 499.813767][ T2656] ? iter_file_splice_write+0xbe0/0xbe0 [ 499.819346][ T2656] do_splice_to+0x12a/0x190 [ 499.823950][ T2656] splice_direct_to_actor+0x2d2/0x970 [ 499.829346][ T2656] ? generic_pipe_buf_nosteal+0x10/0x10 [ 499.834907][ T2656] ? do_splice_to+0x190/0x190 [ 499.839788][ T2656] ? rw_verify_area+0x118/0x360 [ 499.844656][ T2656] do_splice_direct+0x1da/0x2a0 [ 499.849540][ T2656] ? splice_direct_to_actor+0x970/0x970 [ 499.855090][ T2656] ? rw_verify_area+0x118/0x360 [ 499.859942][ T2656] do_sendfile+0x597/0xd00 [ 499.864360][ T2656] ? do_compat_pwritev64+0x1c0/0x1c0 [ 499.869645][ T2656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 499.875882][ T2656] ? fput+0x1b/0x20 [ 499.879862][ T2656] __x64_sys_sendfile64+0x1dd/0x220 [ 499.885403][ T2656] ? __ia32_sys_sendfile+0x230/0x230 [ 499.891049][ T2656] ? do_syscall_64+0x26/0x610 [ 499.895721][ T2656] ? lockdep_hardirqs_on+0x418/0x5d0 [ 499.900996][ T2656] ? trace_hardirqs_on+0x67/0x230 [ 499.906028][ T2656] do_syscall_64+0x103/0x610 [ 499.910613][ T2656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.916511][ T2656] RIP: 0033:0x4582b9 [ 499.920402][ T2656] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.940010][ T2656] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 499.948416][ T2656] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 499.956393][ T2656] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 499.964380][ T2656] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 499.972350][ T2656] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 499.980318][ T2656] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:13 executing program 0 (fault-call:4 fault-nth:36): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x77, 0x0) [ 500.142717][ T2704] FAULT_INJECTION: forcing a failure. [ 500.142717][ T2704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.181076][ T2704] CPU: 0 PID: 2704 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 500.189006][ T2704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.199069][ T2704] Call Trace: [ 500.202369][ T2704] dump_stack+0x172/0x1f0 [ 500.206712][ T2704] should_fail.cold+0xa/0x15 [ 500.211489][ T2704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.217316][ T2704] ? ___might_sleep+0x163/0x280 [ 500.222205][ T2704] should_fail_alloc_page+0x50/0x60 [ 500.227413][ T2704] __alloc_pages_nodemask+0x1a1/0x7e0 [ 500.232803][ T2704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.238799][ T2704] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 500.244525][ T2704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.250783][ T2704] ? __kmalloc_node+0x3d/0x70 [ 500.255907][ T2704] ? rcu_read_lock_sched_held+0x110/0x130 [ 500.261619][ T2704] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 500.267864][ T2704] alloc_pages_current+0x107/0x210 [ 500.272983][ T2704] push_pipe+0x3fc/0x7a0 [ 500.277238][ T2704] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 500.282893][ T2704] ? debug_check_no_obj_freed+0x200/0x464 [ 500.288611][ T2704] ? iov_iter_revert+0xaa0/0xaa0 [ 500.293545][ T2704] ? lockdep_hardirqs_on+0x418/0x5d0 [ 500.293563][ T2704] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 500.293577][ T2704] ? iov_iter_pipe+0xba/0x2f0 [ 500.293596][ T2704] default_file_splice_read+0x199/0x890 [ 500.293612][ T2704] ? free_unref_page+0x476/0x600 [ 500.293632][ T2704] ? __put_page+0x8d/0xd0 [ 500.304647][ T2704] ? trace_hardirqs_on+0x67/0x230 [ 500.304668][ T2704] ? iter_file_splice_write+0xbe0/0xbe0 [ 500.304687][ T2704] ? __put_page+0x92/0xd0 [ 500.304705][ T2704] ? generic_pipe_buf_release+0x105/0x160 [ 500.304723][ T2704] ? direct_splice_actor+0x1a0/0x1a0 [ 500.304737][ T2704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.304751][ T2704] ? fsnotify+0x811/0xbc0 [ 500.304770][ T2704] ? fsnotify+0xbc0/0xbc0 [ 500.304792][ T2704] ? fsnotify_first_mark+0x210/0x210 [ 500.370506][ T2704] ? splice_shrink_spd+0xd0/0xd0 [ 500.375479][ T2704] ? security_file_permission+0x94/0x380 [ 500.381396][ T2704] ? iter_file_splice_write+0xbe0/0xbe0 [ 500.386962][ T2704] do_splice_to+0x12a/0x190 17:31:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000000c0)={0x40, 0x4, 0x2, 0x200}) 17:31:13 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 500.391485][ T2704] splice_direct_to_actor+0x2d2/0x970 [ 500.396963][ T2704] ? generic_pipe_buf_nosteal+0x10/0x10 [ 500.402618][ T2704] ? do_splice_to+0x190/0x190 [ 500.407322][ T2704] ? rw_verify_area+0x118/0x360 [ 500.412206][ T2704] do_splice_direct+0x1da/0x2a0 [ 500.417078][ T2704] ? splice_direct_to_actor+0x970/0x970 [ 500.422646][ T2704] ? rw_verify_area+0x118/0x360 [ 500.427489][ T2704] do_sendfile+0x597/0xd00 [ 500.431900][ T2704] ? do_compat_pwritev64+0x1c0/0x1c0 [ 500.437276][ T2704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 500.443634][ T2704] ? fput+0x1b/0x20 [ 500.447516][ T2704] __x64_sys_sendfile64+0x1dd/0x220 [ 500.461699][ T2704] ? __ia32_sys_sendfile+0x230/0x230 [ 500.461716][ T2704] ? do_syscall_64+0x26/0x610 [ 500.461732][ T2704] ? lockdep_hardirqs_on+0x418/0x5d0 [ 500.461747][ T2704] ? trace_hardirqs_on+0x67/0x230 [ 500.461765][ T2704] do_syscall_64+0x103/0x610 [ 500.461782][ T2704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.461794][ T2704] RIP: 0033:0x4582b9 [ 500.461809][ T2704] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.461815][ T2704] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 500.461829][ T2704] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 500.461836][ T2704] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:13 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES16=r0, @ANYBLOB=',\x00']) set_mempolicy(0x3, &(0x7f0000000040)=0x81, 0x3) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x5, 0x7, 0x2}}, 0x28) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:13 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f0000000400)={&(0x7f0000000200)={0x1f0, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2a9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9680}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb7b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff00000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x100, @rand_addr="d6c41f164dfa2d313e9cc1c9578cfb78", 0x98ca}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100000000}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb552}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfc00000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x20004011}, 0x20000000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x78, 0x0) 17:31:13 executing program 0 (fault-call:4 fault-nth:37): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 500.461843][ T2704] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 500.461850][ T2704] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 500.461858][ T2704] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 [ 500.623194][ T2899] FAULT_INJECTION: forcing a failure. [ 500.623194][ T2899] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.653418][ T2899] CPU: 1 PID: 2899 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 500.661345][ T2899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.661353][ T2899] Call Trace: [ 500.661383][ T2899] dump_stack+0x172/0x1f0 [ 500.661406][ T2899] should_fail.cold+0xa/0x15 [ 500.661438][ T2899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.679102][ T2899] ? ___might_sleep+0x163/0x280 [ 500.679129][ T2899] should_fail_alloc_page+0x50/0x60 [ 500.679145][ T2899] __alloc_pages_nodemask+0x1a1/0x7e0 [ 500.679162][ T2899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.679194][ T2899] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 500.689579][ T2899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:31:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000000c0)=0x4000000000) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) syz_open_procfs(r1, &(0x7f0000000140)='syscall\x00') [ 500.689604][ T2899] ? __kmalloc_node+0x3d/0x70 [ 500.689621][ T2899] ? rcu_read_lock_sched_held+0x110/0x130 [ 500.689636][ T2899] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 500.689661][ T2899] alloc_pages_current+0x107/0x210 [ 500.716678][ T2899] push_pipe+0x3fc/0x7a0 [ 500.716709][ T2899] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 500.716725][ T2899] ? debug_check_no_obj_freed+0x200/0x464 [ 500.716747][ T2899] ? iov_iter_revert+0xaa0/0xaa0 [ 500.716761][ T2899] ? lockdep_hardirqs_on+0x418/0x5d0 [ 500.716775][ T2899] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 500.716787][ T2899] ? iov_iter_pipe+0xba/0x2f0 [ 500.716806][ T2899] default_file_splice_read+0x199/0x890 [ 500.716821][ T2899] ? free_unref_page+0x476/0x600 [ 500.716831][ T2899] ? __put_page+0x8d/0xd0 [ 500.716849][ T2899] ? trace_hardirqs_on+0x67/0x230 [ 500.716863][ T2899] ? iter_file_splice_write+0xbe0/0xbe0 [ 500.716879][ T2899] ? __put_page+0x92/0xd0 [ 500.716898][ T2899] ? generic_pipe_buf_release+0x105/0x160 [ 500.716919][ T2899] ? direct_splice_actor+0x1a0/0x1a0 [ 500.740009][ T2899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.828708][ T2899] ? fsnotify+0x811/0xbc0 [ 500.833069][ T2899] ? fsnotify+0xbc0/0xbc0 [ 500.837452][ T2899] ? fsnotify_first_mark+0x210/0x210 [ 500.842853][ T2899] ? splice_shrink_spd+0xd0/0xd0 [ 500.847819][ T2899] ? security_file_permission+0x94/0x380 [ 500.853675][ T2899] ? iter_file_splice_write+0xbe0/0xbe0 [ 500.859254][ T2899] do_splice_to+0x12a/0x190 [ 500.863766][ T2899] splice_direct_to_actor+0x2d2/0x970 [ 500.869174][ T2899] ? generic_pipe_buf_nosteal+0x10/0x10 17:31:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 500.874732][ T2899] ? do_splice_to+0x190/0x190 [ 500.879426][ T2899] ? rw_verify_area+0x118/0x360 [ 500.884383][ T2899] do_splice_direct+0x1da/0x2a0 [ 500.889253][ T2899] ? splice_direct_to_actor+0x970/0x970 [ 500.894828][ T2899] ? rw_verify_area+0x118/0x360 [ 500.899703][ T2899] do_sendfile+0x597/0xd00 [ 500.904150][ T2899] ? do_compat_pwritev64+0x1c0/0x1c0 [ 500.909451][ T2899] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 500.915728][ T2899] ? fput+0x1b/0x20 [ 500.919533][ T2899] __x64_sys_sendfile64+0x1dd/0x220 [ 500.924760][ T2899] ? __ia32_sys_sendfile+0x230/0x230 [ 500.930055][ T2899] ? do_syscall_64+0x26/0x610 [ 500.934759][ T2899] ? lockdep_hardirqs_on+0x418/0x5d0 [ 500.940059][ T2899] ? trace_hardirqs_on+0x67/0x230 [ 500.945093][ T2899] do_syscall_64+0x103/0x610 [ 500.949717][ T2899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.955619][ T2899] RIP: 0033:0x4582b9 [ 500.959503][ T2899] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.979112][ T2899] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 500.987523][ T2899] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 500.995532][ T2899] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 501.003523][ T2899] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 501.011676][ T2899] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 17:31:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x79, 0x0) [ 501.019750][ T2899] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:14 executing program 0 (fault-call:4 fault-nth:38): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:14 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0xa0800) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00', 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file1\x00', 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:14 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7a, 0x0) [ 501.235682][ T3057] FAULT_INJECTION: forcing a failure. [ 501.235682][ T3057] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 501.284754][ T3057] CPU: 1 PID: 3057 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 501.292699][ T3057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.302767][ T3057] Call Trace: [ 501.306086][ T3057] dump_stack+0x172/0x1f0 [ 501.310446][ T3057] should_fail.cold+0xa/0x15 [ 501.315067][ T3057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.320894][ T3057] ? ___might_sleep+0x163/0x280 [ 501.325764][ T3057] should_fail_alloc_page+0x50/0x60 17:31:14 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8, 0x10000) openat(r0, &(0x7f0000000180)='./file0\x00', 0x80040, 0x100) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r2 = dup2(r1, r1) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x200, &(0x7f0000000040)=0x1) [ 501.330971][ T3057] __alloc_pages_nodemask+0x1a1/0x7e0 [ 501.336365][ T3057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.342200][ T3057] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 501.347950][ T3057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.354222][ T3057] ? __kmalloc_node+0x3d/0x70 [ 501.358919][ T3057] ? rcu_read_lock_sched_held+0x110/0x130 [ 501.364655][ T3057] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 501.370918][ T3057] alloc_pages_current+0x107/0x210 [ 501.376074][ T3057] push_pipe+0x3fc/0x7a0 [ 501.380346][ T3057] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 501.385980][ T3057] ? debug_check_no_obj_freed+0x200/0x464 [ 501.391715][ T3057] ? iov_iter_revert+0xaa0/0xaa0 [ 501.396649][ T3057] ? lockdep_hardirqs_on+0x418/0x5d0 [ 501.401937][ T3057] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 501.407653][ T3057] ? iov_iter_pipe+0xba/0x2f0 [ 501.412332][ T3057] default_file_splice_read+0x199/0x890 [ 501.417874][ T3057] ? free_unref_page+0x476/0x600 [ 501.422807][ T3057] ? __put_page+0x8d/0xd0 [ 501.427130][ T3057] ? trace_hardirqs_on+0x67/0x230 [ 501.432144][ T3057] ? iter_file_splice_write+0xbe0/0xbe0 [ 501.437692][ T3057] ? __put_page+0x92/0xd0 [ 501.442034][ T3057] ? generic_pipe_buf_release+0x105/0x160 [ 501.447744][ T3057] ? direct_splice_actor+0x1a0/0x1a0 [ 501.453037][ T3057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.459271][ T3057] ? fsnotify+0x811/0xbc0 [ 501.463610][ T3057] ? fsnotify+0xbc0/0xbc0 [ 501.467942][ T3057] ? fsnotify_first_mark+0x210/0x210 [ 501.473232][ T3057] ? splice_shrink_spd+0xd0/0xd0 [ 501.478192][ T3057] ? security_file_permission+0x94/0x380 [ 501.483863][ T3057] ? iter_file_splice_write+0xbe0/0xbe0 [ 501.489426][ T3057] do_splice_to+0x12a/0x190 [ 501.493960][ T3057] splice_direct_to_actor+0x2d2/0x970 [ 501.499344][ T3057] ? generic_pipe_buf_nosteal+0x10/0x10 [ 501.504908][ T3057] ? do_splice_to+0x190/0x190 [ 501.509592][ T3057] ? rw_verify_area+0x118/0x360 [ 501.514450][ T3057] do_splice_direct+0x1da/0x2a0 [ 501.519332][ T3057] ? splice_direct_to_actor+0x970/0x970 [ 501.524898][ T3057] ? rw_verify_area+0x118/0x360 [ 501.529753][ T3057] do_sendfile+0x597/0xd00 [ 501.534195][ T3057] ? do_compat_pwritev64+0x1c0/0x1c0 [ 501.539525][ T3057] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 501.545774][ T3057] ? fput+0x1b/0x20 [ 501.555958][ T3057] __x64_sys_sendfile64+0x1dd/0x220 [ 501.561160][ T3057] ? __ia32_sys_sendfile+0x230/0x230 [ 501.566497][ T3057] ? do_syscall_64+0x26/0x610 [ 501.571208][ T3057] ? lockdep_hardirqs_on+0x418/0x5d0 [ 501.576544][ T3057] ? trace_hardirqs_on+0x67/0x230 [ 501.581568][ T3057] do_syscall_64+0x103/0x610 [ 501.586181][ T3057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.592074][ T3057] RIP: 0033:0x4582b9 [ 501.595964][ T3057] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.615567][ T3057] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 501.624000][ T3057] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 17:31:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7b, 0x0) 17:31:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000240)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) [ 501.631996][ T3057] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 501.639982][ T3057] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 501.648041][ T3057] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 501.656013][ T3057] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:14 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7c, 0x0) 17:31:14 executing program 0 (fault-call:4 fault-nth:39): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="1b80726f7587e1136b9cd048aec54f3d6a620b228d5f48643d354abbee97829ef210a2033e1c85b88fda5b5b5f875490f2d1bb05f16b4dc05ceeabee1794c975e626db93ff5522ca0868154ed6c4f701ec2b1e6ba970d9e097d8f7e7d283acd0d6de11d92f923b82a0792cf1d3", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) connect$x25(r1, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) r2 = getegid() ioctl$TUNSETGROUP(r1, 0x400454ce, r2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:15 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @default, 0x4}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}, 0x48) 17:31:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7d, 0x0) [ 502.003123][ T3315] FAULT_INJECTION: forcing a failure. [ 502.003123][ T3315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.083381][ T3315] CPU: 0 PID: 3315 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 502.091320][ T3315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.101400][ T3315] Call Trace: [ 502.104710][ T3315] dump_stack+0x172/0x1f0 [ 502.109060][ T3315] should_fail.cold+0xa/0x15 [ 502.113661][ T3315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.119510][ T3315] ? ___might_sleep+0x163/0x280 [ 502.124380][ T3315] should_fail_alloc_page+0x50/0x60 [ 502.129593][ T3315] __alloc_pages_nodemask+0x1a1/0x7e0 [ 502.134979][ T3315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.140813][ T3315] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 502.146546][ T3315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.152804][ T3315] ? __kmalloc_node+0x3d/0x70 [ 502.157495][ T3315] ? rcu_read_lock_sched_held+0x110/0x130 [ 502.163235][ T3315] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 502.169496][ T3315] alloc_pages_current+0x107/0x210 [ 502.174627][ T3315] push_pipe+0x3fc/0x7a0 [ 502.178892][ T3315] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 502.184536][ T3315] ? debug_check_no_obj_freed+0x200/0x464 [ 502.190376][ T3315] ? iov_iter_revert+0xaa0/0xaa0 [ 502.195326][ T3315] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.200625][ T3315] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 502.206361][ T3315] ? iov_iter_pipe+0xba/0x2f0 [ 502.211055][ T3315] default_file_splice_read+0x199/0x890 [ 502.216606][ T3315] ? free_unref_page+0x476/0x600 [ 502.221553][ T3315] ? __put_page+0x8d/0xd0 [ 502.221574][ T3315] ? trace_hardirqs_on+0x67/0x230 [ 502.230910][ T3315] ? iter_file_splice_write+0xbe0/0xbe0 [ 502.230930][ T3315] ? __put_page+0x92/0xd0 [ 502.230948][ T3315] ? generic_pipe_buf_release+0x105/0x160 [ 502.230964][ T3315] ? direct_splice_actor+0x1a0/0x1a0 [ 502.230979][ T3315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.230994][ T3315] ? fsnotify+0x811/0xbc0 [ 502.231012][ T3315] ? fsnotify+0xbc0/0xbc0 [ 502.231028][ T3315] ? fsnotify_first_mark+0x210/0x210 [ 502.231049][ T3315] ? splice_shrink_spd+0xd0/0xd0 [ 502.240949][ T3315] ? security_file_permission+0x94/0x380 [ 502.240973][ T3315] ? iter_file_splice_write+0xbe0/0xbe0 [ 502.240992][ T3315] do_splice_to+0x12a/0x190 [ 502.266856][ T3315] splice_direct_to_actor+0x2d2/0x970 [ 502.266877][ T3315] ? generic_pipe_buf_nosteal+0x10/0x10 [ 502.266897][ T3315] ? do_splice_to+0x190/0x190 [ 502.266919][ T3315] ? rw_verify_area+0x118/0x360 [ 502.277145][ T3315] do_splice_direct+0x1da/0x2a0 [ 502.277163][ T3315] ? splice_direct_to_actor+0x970/0x970 [ 502.277203][ T3315] ? rw_verify_area+0x118/0x360 [ 502.277222][ T3315] do_sendfile+0x597/0xd00 [ 502.277249][ T3315] ? do_compat_pwritev64+0x1c0/0x1c0 [ 502.338405][ T3315] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 502.344664][ T3315] ? fput+0x1b/0x20 [ 502.348495][ T3315] __x64_sys_sendfile64+0x1dd/0x220 [ 502.353709][ T3315] ? __ia32_sys_sendfile+0x230/0x230 [ 502.359004][ T3315] ? do_syscall_64+0x26/0x610 [ 502.363690][ T3315] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.363709][ T3315] ? trace_hardirqs_on+0x67/0x230 [ 502.363729][ T3315] do_syscall_64+0x103/0x610 [ 502.363749][ T3315] entry_SYSCALL_64_after_hwframe+0x49/0xbe 17:31:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)={0x0, r0}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x81) 17:31:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000023c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:15 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 502.363760][ T3315] RIP: 0033:0x4582b9 [ 502.363775][ T3315] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.363783][ T3315] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 502.388452][ T3315] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 502.388462][ T3315] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:15 executing program 0 (fault-call:4 fault-nth:40): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:15 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x7e, 0x0) [ 502.388472][ T3315] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 502.388481][ T3315] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 502.388490][ T3315] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:15 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfffffffffffffffb, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x6, 0xd3}, 0x0, 0x0, &(0x7f0000000380)={0x2e, 0x6ede, 0xfffffffffffffff9, 0x3}, &(0x7f00000003c0)=0x80, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x8}}, 0x10) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00000000000000d16853a9c403fe19a92bacae22976127ad08000000eeeb4bb804802ed357ec7a07c731bdb9d196041317c8040000e8872c8ebf0fd4f32ce7686803d7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r2 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x100) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000140)={{0x3a, @multicast1, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x3, 0x52}, {@multicast1, 0x4e22, 0x0, 0x7, 0x9, 0x2}}, 0x44) [ 502.540920][ T3485] FAULT_INJECTION: forcing a failure. [ 502.540920][ T3485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 502.582548][ T3485] CPU: 0 PID: 3485 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 502.590508][ T3485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.600670][ T3485] Call Trace: [ 502.603984][ T3485] dump_stack+0x172/0x1f0 [ 502.609382][ T3485] should_fail.cold+0xa/0x15 [ 502.614080][ T3485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.619905][ T3485] ? ___might_sleep+0x163/0x280 [ 502.624777][ T3485] should_fail_alloc_page+0x50/0x60 [ 502.629991][ T3485] __alloc_pages_nodemask+0x1a1/0x7e0 [ 502.630009][ T3485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.630025][ T3485] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 502.630039][ T3485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.630059][ T3485] ? __kmalloc_node+0x3d/0x70 [ 502.630075][ T3485] ? rcu_read_lock_sched_held+0x110/0x130 [ 502.630089][ T3485] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 502.630105][ T3485] alloc_pages_current+0x107/0x210 [ 502.630123][ T3485] push_pipe+0x3fc/0x7a0 [ 502.630145][ T3485] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 502.653289][ T3485] ? debug_check_no_obj_freed+0x200/0x464 [ 502.653315][ T3485] ? iov_iter_revert+0xaa0/0xaa0 [ 502.653331][ T3485] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.653346][ T3485] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 502.653358][ T3485] ? iov_iter_pipe+0xba/0x2f0 [ 502.653377][ T3485] default_file_splice_read+0x199/0x890 [ 502.653392][ T3485] ? free_unref_page+0x476/0x600 [ 502.653403][ T3485] ? __put_page+0x8d/0xd0 [ 502.653427][ T3485] ? trace_hardirqs_on+0x67/0x230 [ 502.653443][ T3485] ? iter_file_splice_write+0xbe0/0xbe0 [ 502.653459][ T3485] ? __put_page+0x92/0xd0 [ 502.653477][ T3485] ? generic_pipe_buf_release+0x105/0x160 [ 502.653497][ T3485] ? direct_splice_actor+0x1a0/0x1a0 [ 502.695900][ T3485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.695919][ T3485] ? fsnotify+0x811/0xbc0 [ 502.695937][ T3485] ? fsnotify+0xbc0/0xbc0 [ 502.695952][ T3485] ? fsnotify_first_mark+0x210/0x210 [ 502.695976][ T3485] ? splice_shrink_spd+0xd0/0xd0 [ 502.711679][ T3485] ? security_file_permission+0x94/0x380 [ 502.711704][ T3485] ? iter_file_splice_write+0xbe0/0xbe0 [ 502.711724][ T3485] do_splice_to+0x12a/0x190 [ 502.727598][ T3485] splice_direct_to_actor+0x2d2/0x970 [ 502.727619][ T3485] ? generic_pipe_buf_nosteal+0x10/0x10 [ 502.727637][ T3485] ? do_splice_to+0x190/0x190 [ 502.727655][ T3485] ? rw_verify_area+0x118/0x360 [ 502.727670][ T3485] do_splice_direct+0x1da/0x2a0 [ 502.727684][ T3485] ? splice_direct_to_actor+0x970/0x970 [ 502.727707][ T3485] ? rw_verify_area+0x118/0x360 [ 502.727724][ T3485] do_sendfile+0x597/0xd00 [ 502.727747][ T3485] ? do_compat_pwritev64+0x1c0/0x1c0 [ 502.727764][ T3485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 502.727783][ T3485] ? fput+0x1b/0x20 [ 502.738376][ T3485] __x64_sys_sendfile64+0x1dd/0x220 [ 502.738396][ T3485] ? __ia32_sys_sendfile+0x230/0x230 [ 502.738411][ T3485] ? do_syscall_64+0x26/0x610 [ 502.738425][ T3485] ? lockdep_hardirqs_on+0x418/0x5d0 [ 502.738440][ T3485] ? trace_hardirqs_on+0x67/0x230 [ 502.738457][ T3485] do_syscall_64+0x103/0x610 [ 502.738476][ T3485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.738488][ T3485] RIP: 0033:0x4582b9 [ 502.738503][ T3485] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.738511][ T3485] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 502.738524][ T3485] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 502.738541][ T3485] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 502.937386][ T3485] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 502.945365][ T3485] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 502.953350][ T3485] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:31:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x82, 0x0) 17:31:16 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netfilter\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:16 executing program 0 (fault-call:4 fault-nth:41): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 503.104619][ T3577] FAULT_INJECTION: forcing a failure. [ 503.104619][ T3577] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 503.142559][ T3577] CPU: 0 PID: 3577 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 17:31:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x83, 0x0) 17:31:16 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 503.150485][ T3577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.160556][ T3577] Call Trace: [ 503.163877][ T3577] dump_stack+0x172/0x1f0 [ 503.168235][ T3577] should_fail.cold+0xa/0x15 [ 503.172844][ T3577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 503.178665][ T3577] ? ___might_sleep+0x163/0x280 [ 503.183534][ T3577] should_fail_alloc_page+0x50/0x60 [ 503.183551][ T3577] __alloc_pages_nodemask+0x1a1/0x7e0 [ 503.183567][ T3577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 503.183584][ T3577] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 503.183599][ T3577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.183619][ T3577] ? __kmalloc_node+0x3d/0x70 [ 503.183635][ T3577] ? rcu_read_lock_sched_held+0x110/0x130 [ 503.183650][ T3577] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 503.183669][ T3577] alloc_pages_current+0x107/0x210 [ 503.194252][ T3577] push_pipe+0x3fc/0x7a0 [ 503.194277][ T3577] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 503.194291][ T3577] ? debug_check_no_obj_freed+0x200/0x464 [ 503.194311][ T3577] ? iov_iter_revert+0xaa0/0xaa0 17:31:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x84, 0x0) [ 503.194327][ T3577] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.194341][ T3577] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 503.194354][ T3577] ? iov_iter_pipe+0xba/0x2f0 [ 503.194374][ T3577] default_file_splice_read+0x199/0x890 [ 503.194389][ T3577] ? free_unref_page+0x476/0x600 [ 503.194401][ T3577] ? __put_page+0x8d/0xd0 [ 503.194423][ T3577] ? trace_hardirqs_on+0x67/0x230 [ 503.228974][ T3577] ? iter_file_splice_write+0xbe0/0xbe0 [ 503.244723][ T3577] ? __put_page+0x92/0xd0 17:31:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x85, 0x0) [ 503.244745][ T3577] ? generic_pipe_buf_release+0x105/0x160 [ 503.244764][ T3577] ? direct_splice_actor+0x1a0/0x1a0 [ 503.244778][ T3577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.244793][ T3577] ? fsnotify+0x811/0xbc0 [ 503.244812][ T3577] ? fsnotify+0xbc0/0xbc0 [ 503.244827][ T3577] ? fsnotify_first_mark+0x210/0x210 [ 503.244843][ T3577] ? splice_shrink_spd+0xd0/0xd0 [ 503.244869][ T3577] ? security_file_permission+0x94/0x380 [ 503.244890][ T3577] ? iter_file_splice_write+0xbe0/0xbe0 [ 503.244909][ T3577] do_splice_to+0x12a/0x190 [ 503.352931][ T3577] splice_direct_to_actor+0x2d2/0x970 [ 503.358346][ T3577] ? generic_pipe_buf_nosteal+0x10/0x10 [ 503.363910][ T3577] ? do_splice_to+0x190/0x190 [ 503.368610][ T3577] ? rw_verify_area+0x118/0x360 [ 503.373476][ T3577] do_splice_direct+0x1da/0x2a0 [ 503.378353][ T3577] ? splice_direct_to_actor+0x970/0x970 [ 503.383918][ T3577] ? rw_verify_area+0x118/0x360 [ 503.388790][ T3577] do_sendfile+0x597/0xd00 [ 503.393235][ T3577] ? do_compat_pwritev64+0x1c0/0x1c0 [ 503.398528][ T3577] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 17:31:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x86, 0x0) [ 503.404766][ T3577] ? fput+0x1b/0x20 [ 503.408586][ T3577] __x64_sys_sendfile64+0x1dd/0x220 [ 503.413789][ T3577] ? __ia32_sys_sendfile+0x230/0x230 [ 503.419098][ T3577] ? do_syscall_64+0x26/0x610 [ 503.423815][ T3577] ? lockdep_hardirqs_on+0x418/0x5d0 [ 503.429122][ T3577] ? trace_hardirqs_on+0x67/0x230 [ 503.434196][ T3577] do_syscall_64+0x103/0x610 [ 503.438897][ T3577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.444791][ T3577] RIP: 0033:0x4582b9 17:31:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x87, 0x0) [ 503.448849][ T3577] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.468472][ T3577] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 503.476906][ T3577] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 503.484902][ T3577] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 503.492891][ T3577] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:31:16 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = accept4$tipc(0xffffffffffffff9c, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10, 0x80000) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 503.500877][ T3577] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 503.508845][ T3577] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:31:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000001c0)) bind$ax25(r0, &(0x7f0000000140)={{0x3, @bcast}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) fcntl$setlease(r0, 0x400, 0x2) 17:31:17 executing program 0 (fault-call:4 fault-nth:42): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:17 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:17 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f646598f400ff3030796f303030303030303030303434303030302c757365725f69643dab1242636de8f8e6f837d222b8a5674c962315d2d6f385ca71e964c0f9", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000040c0), 0x1000) r3 = semget$private(0x0, 0x2, 0x200) r4 = geteuid() fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000004c0)={{0x3, r4, r5, r6, r7, 0x20, 0x2}, 0x6, 0x8000, 0x3f}) write$FUSE_INTERRUPT(r2, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x88, 0x0) 17:31:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x89, 0x0) [ 504.084793][ T3622] FAULT_INJECTION: forcing a failure. [ 504.084793][ T3622] name failslab, interval 1, probability 0, space 0, times 0 17:31:17 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2cd58c0600000000000000f70c00a93030303030303030303030313034303030302c757365643d000004", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 504.131758][ T3622] CPU: 0 PID: 3622 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 504.139695][ T3622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.149775][ T3622] Call Trace: [ 504.153087][ T3622] dump_stack+0x172/0x1f0 [ 504.157443][ T3622] should_fail.cold+0xa/0x15 [ 504.162060][ T3622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 504.167896][ T3622] ? ___might_sleep+0x163/0x280 [ 504.167915][ T3622] __should_failslab+0x121/0x190 [ 504.167930][ T3622] should_failslab+0x9/0x14 [ 504.167943][ T3622] __kmalloc+0x2dc/0x740 [ 504.167962][ T3622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.167977][ T3622] ? rw_copy_check_uvector+0x28c/0x330 [ 504.167997][ T3622] rw_copy_check_uvector+0x28c/0x330 [ 504.168013][ T3622] ? rcu_read_lock_sched_held+0x110/0x130 [ 504.168032][ T3622] import_iovec+0xbf/0x200 [ 504.168052][ T3622] ? dup_iter+0x260/0x260 [ 504.182575][ T3622] ? __kmalloc_node+0x3d/0x70 [ 504.222910][ T3622] ? rcu_read_lock_sched_held+0x110/0x130 [ 504.228651][ T3622] vfs_readv+0xc6/0x160 [ 504.232821][ T3622] ? alloc_pages_current+0x10f/0x210 [ 504.238398][ T3622] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 504.244571][ T3622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.250930][ T3622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.250949][ T3622] ? iov_iter_get_pages_alloc+0x3ae/0x1350 [ 504.250972][ T3622] ? iov_iter_revert+0xaa0/0xaa0 [ 504.250994][ T3622] ? lockdep_hardirqs_on+0x418/0x5d0 [ 504.273251][ T3622] ? __sanitizer_cov_trace_cmp4+0x16/0x20 17:31:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8a, 0x0) [ 504.278983][ T3622] ? iov_iter_pipe+0xba/0x2f0 [ 504.283695][ T3622] default_file_splice_read+0x475/0x890 [ 504.283714][ T3622] ? free_unref_page+0x476/0x600 [ 504.283727][ T3622] ? __put_page+0x8d/0xd0 [ 504.283749][ T3622] ? iter_file_splice_write+0xbe0/0xbe0 [ 504.283764][ T3622] ? __put_page+0x92/0xd0 [ 504.283782][ T3622] ? generic_pipe_buf_release+0x105/0x160 [ 504.283799][ T3622] ? direct_splice_actor+0x1a0/0x1a0 [ 504.283813][ T3622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.283854][ T3622] ? security_file_permission+0x94/0x380 [ 504.283874][ T3622] ? iter_file_splice_write+0xbe0/0xbe0 [ 504.336917][ T3622] do_splice_to+0x12a/0x190 [ 504.341440][ T3622] splice_direct_to_actor+0x2d2/0x970 [ 504.341458][ T3622] ? generic_pipe_buf_nosteal+0x10/0x10 [ 504.341477][ T3622] ? do_splice_to+0x190/0x190 [ 504.341496][ T3622] ? rw_verify_area+0x118/0x360 [ 504.341511][ T3622] do_splice_direct+0x1da/0x2a0 [ 504.341528][ T3622] ? splice_direct_to_actor+0x970/0x970 [ 504.341552][ T3622] ? rw_verify_area+0x118/0x360 [ 504.341569][ T3622] do_sendfile+0x597/0xd00 [ 504.341595][ T3622] ? do_compat_pwritev64+0x1c0/0x1c0 [ 504.372428][ T3622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 504.372447][ T3622] ? fput+0x1b/0x20 [ 504.372470][ T3622] __x64_sys_sendfile64+0x1dd/0x220 [ 504.372489][ T3622] ? __ia32_sys_sendfile+0x230/0x230 [ 504.372511][ T3622] ? do_syscall_64+0x26/0x610 [ 504.418006][ T3622] ? lockdep_hardirqs_on+0x418/0x5d0 [ 504.423337][ T3622] ? trace_hardirqs_on+0x67/0x230 [ 504.428392][ T3622] do_syscall_64+0x103/0x610 [ 504.433006][ T3622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.438933][ T3622] RIP: 0033:0x4582b9 [ 504.442834][ T3622] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.463907][ T3622] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 504.472337][ T3622] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 17:31:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8b, 0x0) 17:31:17 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:17 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000003c0)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000140)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 504.480319][ T3622] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 504.488583][ T3622] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 504.496563][ T3622] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 504.504547][ T3622] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:31:18 executing program 0 (fault-call:4 fault-nth:43): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1f}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c) 17:31:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8c, 0x0) 17:31:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:18 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x6ff, 0x0, 0x8, 0x15c}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0x7}, 0x8) 17:31:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8d, 0x0) 17:31:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 504.988225][ T3772] FAULT_INJECTION: forcing a failure. [ 504.988225][ T3772] name failslab, interval 1, probability 0, space 0, times 0 [ 505.093931][ T3772] CPU: 1 PID: 3772 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 505.101951][ T3772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.112018][ T3772] Call Trace: [ 505.115333][ T3772] dump_stack+0x172/0x1f0 [ 505.119766][ T3772] should_fail.cold+0xa/0x15 [ 505.124481][ T3772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.130306][ T3772] ? ___might_sleep+0x163/0x280 [ 505.135191][ T3772] __should_failslab+0x121/0x190 17:31:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f0000000900000081c9b6bb11a34c4d429db88d2f8d33e77f004e7e95e80dc22f324f904097ec7d5ec9ac0be3c12b"], 0x105000) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:18 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:18 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f646549d5a75d06ad49243d30303030303030303030303030303030303077f9ffff302c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="5b87cb7f6795ae35957866ff93e67eac60e5eaebc55770ce87053bc5b78d9a6e90cef72086c786f91d274b74d35e10ba0b72e9b9259b9d7671a6f7623cb02ccd7871626dd14af5471e02d70c5314d21ff473b600c9d4fc115e0922edaa4f7bd3049d895ae144f67b00acf02dd3d422ad93670ce2d11f"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x2}, 0x28, 0x3) [ 505.140229][ T3772] should_failslab+0x9/0x14 [ 505.144745][ T3772] kmem_cache_alloc_node_trace+0x270/0x720 [ 505.150574][ T3772] __kmalloc_node_track_caller+0x3d/0x70 [ 505.156227][ T3772] __kmalloc_reserve.isra.0+0x40/0xf0 [ 505.161619][ T3772] __alloc_skb+0x10b/0x5e0 [ 505.166051][ T3772] ? skb_trim+0x190/0x190 [ 505.170423][ T3772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.176650][ T3772] ? security_socket_getpeersec_dgram+0x93/0xc0 [ 505.182880][ T3772] netlink_sendmsg+0x97b/0xd70 [ 505.187687][ T3772] ? netlink_unicast+0x720/0x720 [ 505.192967][ T3772] ? tomoyo_socket_sendmsg+0x26/0x30 [ 505.198250][ T3772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.204505][ T3772] ? security_socket_sendmsg+0x93/0xc0 [ 505.209961][ T3772] ? netlink_unicast+0x720/0x720 [ 505.214892][ T3772] sock_sendmsg+0xdd/0x130 [ 505.219308][ T3772] kernel_sendmsg+0x44/0x50 [ 505.223810][ T3772] sock_no_sendpage+0x116/0x150 [ 505.228655][ T3772] ? sock_kfree_s+0x70/0x70 [ 505.233260][ T3772] ? iov_iter_advance+0x295/0xf70 [ 505.238300][ T3772] ? kvfree+0x61/0x70 [ 505.242291][ T3772] kernel_sendpage+0x95/0xf0 [ 505.246915][ T3772] ? sock_kfree_s+0x70/0x70 [ 505.251442][ T3772] sock_sendpage+0x8b/0xc0 [ 505.255987][ T3772] pipe_to_sendpage+0x299/0x370 [ 505.260851][ T3772] ? kernel_sendpage+0xf0/0xf0 [ 505.265609][ T3772] ? direct_splice_actor+0x1a0/0x1a0 [ 505.270893][ T3772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.277131][ T3772] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 505.283220][ T3772] __splice_from_pipe+0x395/0x7d0 [ 505.288250][ T3772] ? direct_splice_actor+0x1a0/0x1a0 [ 505.293540][ T3772] ? direct_splice_actor+0x1a0/0x1a0 [ 505.298825][ T3772] splice_from_pipe+0x108/0x170 [ 505.303676][ T3772] ? splice_shrink_spd+0xd0/0xd0 [ 505.308645][ T3772] ? security_file_permission+0x94/0x380 [ 505.314290][ T3772] generic_splice_sendpage+0x3c/0x50 [ 505.319572][ T3772] ? splice_from_pipe+0x170/0x170 [ 505.324632][ T3772] direct_splice_actor+0x126/0x1a0 [ 505.329742][ T3772] splice_direct_to_actor+0x369/0x970 [ 505.335137][ T3772] ? generic_pipe_buf_nosteal+0x10/0x10 [ 505.340702][ T3772] ? do_splice_to+0x190/0x190 [ 505.345407][ T3772] ? rw_verify_area+0x118/0x360 [ 505.350286][ T3772] do_splice_direct+0x1da/0x2a0 [ 505.355149][ T3772] ? splice_direct_to_actor+0x970/0x970 [ 505.360724][ T3772] ? rw_verify_area+0x118/0x360 [ 505.365682][ T3772] do_sendfile+0x597/0xd00 [ 505.370116][ T3772] ? do_compat_pwritev64+0x1c0/0x1c0 [ 505.375410][ T3772] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 505.381656][ T3772] ? fput+0x1b/0x20 [ 505.385464][ T3772] __x64_sys_sendfile64+0x1dd/0x220 [ 505.390652][ T3772] ? __ia32_sys_sendfile+0x230/0x230 [ 505.395943][ T3772] ? do_syscall_64+0x26/0x610 [ 505.400634][ T3772] ? lockdep_hardirqs_on+0x418/0x5d0 [ 505.405911][ T3772] ? trace_hardirqs_on+0x67/0x230 [ 505.410926][ T3772] do_syscall_64+0x103/0x610 [ 505.415521][ T3772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.421398][ T3772] RIP: 0033:0x4582b9 [ 505.425278][ T3772] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.444875][ T3772] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 505.453288][ T3772] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 505.461254][ T3772] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 505.469580][ T3772] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 505.477541][ T3772] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 505.485500][ T3772] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:18 executing program 0 (fault-call:4 fault-nth:44): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 505.669973][ T3902] FAULT_INJECTION: forcing a failure. [ 505.669973][ T3902] name failslab, interval 1, probability 0, space 0, times 0 [ 505.715705][ T3902] CPU: 0 PID: 3902 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 505.723635][ T3902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.733693][ T3902] Call Trace: [ 505.736993][ T3902] dump_stack+0x172/0x1f0 [ 505.737014][ T3902] should_fail.cold+0xa/0x15 [ 505.737028][ T3902] ? __netlink_lookup+0x3c8/0x7a0 [ 505.737045][ T3902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.737071][ T3902] __should_failslab+0x121/0x190 [ 505.737086][ T3902] should_failslab+0x9/0x14 [ 505.737108][ T3902] kmem_cache_alloc+0x47/0x6f0 [ 505.746014][ T3902] ? lock_acquire+0x16f/0x3f0 [ 505.746029][ T3902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.746049][ T3902] skb_clone+0x150/0x3b0 [ 505.746065][ T3902] netlink_deliver_tap+0x95c/0xc00 [ 505.746093][ T3902] netlink_unicast+0x5a7/0x720 [ 505.796115][ T3902] ? netlink_attachskb+0x770/0x770 [ 505.801234][ T3902] ? _copy_from_iter_full+0x25d/0x900 [ 505.806596][ T3902] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 505.812303][ T3902] ? __check_object_size+0x3d/0x42f [ 505.817504][ T3902] netlink_sendmsg+0x8ae/0xd70 [ 505.822345][ T3902] ? netlink_unicast+0x720/0x720 [ 505.827272][ T3902] ? tomoyo_socket_sendmsg+0x26/0x30 [ 505.832545][ T3902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.838797][ T3902] ? security_socket_sendmsg+0x93/0xc0 [ 505.844278][ T3902] ? netlink_unicast+0x720/0x720 [ 505.849212][ T3902] sock_sendmsg+0xdd/0x130 [ 505.853625][ T3902] kernel_sendmsg+0x44/0x50 [ 505.858151][ T3902] sock_no_sendpage+0x116/0x150 [ 505.863017][ T3902] ? sock_kfree_s+0x70/0x70 [ 505.867516][ T3902] ? iov_iter_advance+0x295/0xf70 [ 505.872526][ T3902] ? kvfree+0x61/0x70 [ 505.876495][ T3902] kernel_sendpage+0x95/0xf0 [ 505.881097][ T3902] ? sock_kfree_s+0x70/0x70 [ 505.885591][ T3902] sock_sendpage+0x8b/0xc0 [ 505.889992][ T3902] pipe_to_sendpage+0x299/0x370 [ 505.894844][ T3902] ? kernel_sendpage+0xf0/0xf0 [ 505.899593][ T3902] ? direct_splice_actor+0x1a0/0x1a0 [ 505.904888][ T3902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.911111][ T3902] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 505.917161][ T3902] __splice_from_pipe+0x395/0x7d0 [ 505.922216][ T3902] ? direct_splice_actor+0x1a0/0x1a0 [ 505.927486][ T3902] ? direct_splice_actor+0x1a0/0x1a0 [ 505.932753][ T3902] splice_from_pipe+0x108/0x170 [ 505.937601][ T3902] ? splice_shrink_spd+0xd0/0xd0 [ 505.942526][ T3902] ? security_file_permission+0x94/0x380 [ 505.948164][ T3902] generic_splice_sendpage+0x3c/0x50 [ 505.953453][ T3902] ? splice_from_pipe+0x170/0x170 [ 505.958476][ T3902] direct_splice_actor+0x126/0x1a0 [ 505.963591][ T3902] splice_direct_to_actor+0x369/0x970 [ 505.968944][ T3902] ? generic_pipe_buf_nosteal+0x10/0x10 [ 505.974471][ T3902] ? do_splice_to+0x190/0x190 [ 505.979155][ T3902] ? rw_verify_area+0x118/0x360 [ 505.984017][ T3902] do_splice_direct+0x1da/0x2a0 [ 505.988851][ T3902] ? splice_direct_to_actor+0x970/0x970 [ 505.994413][ T3902] ? rw_verify_area+0x118/0x360 [ 505.999250][ T3902] do_sendfile+0x597/0xd00 [ 506.003670][ T3902] ? do_compat_pwritev64+0x1c0/0x1c0 [ 506.008943][ T3902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 506.015207][ T3902] ? fput+0x1b/0x20 [ 506.019025][ T3902] __x64_sys_sendfile64+0x1dd/0x220 [ 506.024218][ T3902] ? __ia32_sys_sendfile+0x230/0x230 [ 506.029493][ T3902] ? do_syscall_64+0x26/0x610 [ 506.034152][ T3902] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.039428][ T3902] ? trace_hardirqs_on+0x67/0x230 [ 506.044460][ T3902] do_syscall_64+0x103/0x610 [ 506.049038][ T3902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.054916][ T3902] RIP: 0033:0x4582b9 [ 506.058793][ T3902] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.078389][ T3902] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 506.086793][ T3902] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 506.094763][ T3902] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 506.102719][ T3902] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:31:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 17:31:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8e, 0x0) 17:31:19 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:19 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6664bda3ebb876177fe6b1036f6069713281f2ff8b6f8aad367db8193fd14802d3fe891b5f091e98aef1bd16ffc5a615e8cf844813edce1995985dc2d734ff1505ef928320356f055aae0e4a4aab8fd091e144faec3e0f6f40a2cf1c157f816f4d2b15ac583bdb12fa42965d1a7b383fea4df50a5db76959b5bb97d78d17145967bd1d3703061654494a8632bea7ece54954", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000340)={[0x9, 0x101, 0x100, 0x1ff, 0x40, 0x40, 0x6, 0x80, 0xfffffffffffeffff, 0x1, 0x3b0, 0x40, 0x100, 0x80, 0x2, 0x800], 0x3000, 0x186001}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r3, 0x810, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x3c}}, 0x200000c0) setsockopt$inet6_int(r2, 0x29, 0x1, &(0x7f0000000040)=0xffffffffffff8001, 0x4) poll(&(0x7f0000000000), 0x0, 0x7) [ 506.110697][ T3902] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 506.118662][ T3902] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:19 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x200, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 17:31:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x8f, 0x0) 17:31:19 executing program 0 (fault-call:4 fault-nth:45): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:19 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:19 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000040)={0x4, 0x5, 0x9f, 0x10, 0x9, 0x6e, 0x8}) write$sndseq(r1, &(0x7f0000000140)=[{0x5, 0x40, 0xffffffff, 0x7, @tick=0x5, {0x7, 0x3f}, {0x10001, 0x28000}, @queue={0x7a, {0x3ff, 0x7808}}}, {0x7ff, 0x0, 0x7, 0x4, @time={0x0, 0x989680}, {0x40, 0x80000000}, {0x3, 0x7}, @raw32={[0x0, 0x800, 0x9]}}, {0x8, 0x5, 0x8, 0x8, @time={0x0, 0x1c9c380}, {0x80000000, 0x8}, {0x0, 0xfffffffffffffffc}, @addr={0x71, 0x2}}, {0x2, 0x9, 0x5237, 0x1000, @tick=0x4, {0x3, 0x8000}, {0x800, 0x1f}, @connect={{0x6, 0xfffffffffffffffe}, {0x9, 0x1}}}], 0xc0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@remote={[], 0x0}, 0x7, 'vcan0\x00'}) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000280)=[0x1, 0xfffffffffffff1c6]) 17:31:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 506.379852][ T4105] FAULT_INJECTION: forcing a failure. [ 506.379852][ T4105] name failslab, interval 1, probability 0, space 0, times 0 [ 506.406142][ T4105] CPU: 0 PID: 4105 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 506.417646][ T4105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.428827][ T4105] Call Trace: [ 506.432139][ T4105] dump_stack+0x172/0x1f0 [ 506.436494][ T4105] should_fail.cold+0xa/0x15 [ 506.441088][ T4105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 506.447001][ T4105] ? ___might_sleep+0x163/0x280 [ 506.447021][ T4105] __should_failslab+0x121/0x190 [ 506.447036][ T4105] should_failslab+0x9/0x14 [ 506.447052][ T4105] kmem_cache_alloc_node_trace+0x270/0x720 [ 506.447065][ T4105] ? __lock_acquire+0x548/0x3fb0 [ 506.447080][ T4105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.447095][ T4105] ? sock_sendmsg+0x5b/0x130 [ 506.447113][ T4105] __kmalloc_node+0x3d/0x70 [ 506.447130][ T4105] kvmalloc_node+0x68/0x100 [ 506.447153][ T4105] iov_iter_get_pages_alloc+0x862/0x1350 [ 506.462328][ T4105] ? debug_check_no_obj_freed+0x200/0x464 [ 506.462355][ T4105] ? iov_iter_revert+0xaa0/0xaa0 [ 506.462372][ T4105] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.462395][ T4105] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 506.488528][ T4105] ? iov_iter_pipe+0xba/0x2f0 [ 506.488553][ T4105] default_file_splice_read+0x199/0x890 [ 506.488571][ T4105] ? free_unref_page+0x476/0x600 [ 506.488583][ T4105] ? __put_page+0x8d/0xd0 [ 506.488603][ T4105] ? trace_hardirqs_on+0x67/0x230 [ 506.488623][ T4105] ? iter_file_splice_write+0xbe0/0xbe0 [ 506.498745][ T4105] ? __put_page+0x92/0xd0 [ 506.498767][ T4105] ? generic_pipe_buf_release+0x105/0x160 [ 506.498788][ T4105] ? direct_splice_actor+0x1a0/0x1a0 [ 506.498803][ T4105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.498818][ T4105] ? fsnotify+0x811/0xbc0 17:31:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 506.498837][ T4105] ? fsnotify+0xbc0/0xbc0 [ 506.498852][ T4105] ? fsnotify_first_mark+0x210/0x210 [ 506.498868][ T4105] ? splice_shrink_spd+0xd0/0xd0 [ 506.498893][ T4105] ? security_file_permission+0x94/0x380 [ 506.498914][ T4105] ? iter_file_splice_write+0xbe0/0xbe0 [ 506.498930][ T4105] do_splice_to+0x12a/0x190 [ 506.498949][ T4105] splice_direct_to_actor+0x2d2/0x970 [ 506.498969][ T4105] ? generic_pipe_buf_nosteal+0x10/0x10 [ 506.566099][ T4105] ? do_splice_to+0x190/0x190 [ 506.566123][ T4105] ? rw_verify_area+0x118/0x360 [ 506.566139][ T4105] do_splice_direct+0x1da/0x2a0 [ 506.566155][ T4105] ? splice_direct_to_actor+0x970/0x970 [ 506.566188][ T4105] ? rw_verify_area+0x118/0x360 [ 506.566213][ T4105] do_sendfile+0x597/0xd00 [ 506.566238][ T4105] ? do_compat_pwritev64+0x1c0/0x1c0 [ 506.587138][ T4105] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 506.587157][ T4105] ? fput+0x1b/0x20 [ 506.587202][ T4105] __x64_sys_sendfile64+0x1dd/0x220 [ 506.618660][ T4105] ? __ia32_sys_sendfile+0x230/0x230 [ 506.618679][ T4105] ? do_syscall_64+0x26/0x610 17:31:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x90, 0x0) [ 506.618695][ T4105] ? lockdep_hardirqs_on+0x418/0x5d0 [ 506.618712][ T4105] ? trace_hardirqs_on+0x67/0x230 [ 506.618732][ T4105] do_syscall_64+0x103/0x610 [ 506.659470][ T4105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.659484][ T4105] RIP: 0033:0x4582b9 [ 506.659499][ T4105] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.659507][ T4105] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 506.668540][ T4105] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 506.668550][ T4105] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 506.668558][ T4105] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 506.668567][ T4105] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 506.668576][ T4105] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 17:31:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000000c0)=0x1, 0x4) 17:31:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:20 executing program 0 (fault-call:4 fault-nth:46): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:20 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x91, 0x0) 17:31:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x8b, 0x5, 0x7, "aed14f9ce9f3f06b05d2b07ec10940c1", "33ad48fa59a33d3627851105fbe0b71cf8aad7251e41013ec70eccd9a004f564e0e462d7ffb1b3a961330a658dde0b23a95ee0e561cb80f62b2e6a37dcd6d7f9860b56171db281d8e1b435e45b7a44605bbe4d55c1405753553cc88907c3c6327fe440faac68a55a73773c29082eed87b586b06658ba"}, 0x8b, 0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xff, 0x20100) r2 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)="12efb69e33f21ee4cc8d0dc590e4f86fc4014c5f3aaa0250aec1b6e86f15bd5c0b79ef2c8e053b7a11865310bb1fcb3afec7a987df5b04bc1960e56d2ca51a366c1d1abb146230892d7b6179e56d04623eda9b1fe172cd4e247aa00870fea6439519bbf24759a366a14b2268f62ca0228fe4ff05a50cb63f5195a00e4b98ec9852a980ee75e946871578", 0x8a, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r2, 0xffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x4, {0xf7}}, 0x18) write$P9_RGETLOCK(r1, &(0x7f0000000140)={0x1e, 0x37, 0x2, {0x2, 0x100000000, 0x4d, r3}}, 0x1e) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f00000001c0)=0xe5f1) utimensat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={{}, {0x0, 0x7530}}, 0x100) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x112, 0x4, 0x1ff, "4225811295007aaa06dc97806b36e563", "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"}, 0x112, 0x2) 17:31:20 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x92, 0x0) [ 507.157605][ T4181] FAULT_INJECTION: forcing a failure. [ 507.157605][ T4181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:31:20 executing program 2: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = getpgrp(0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$P9_RSTAT(r2, &(0x7f00000002c0)={0x50, 0x7d, 0x2, {0x0, 0x49, 0x3, 0x16, {0x0, 0x2, 0x7}, 0x800000, 0x1, 0x80000000000007, 0x7, 0xa, '/dev/fuse\x00', 0x0, '', 0x2, 'fd', 0xa, '!)vmnet1+('}}, 0x50) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RVERSION(r3, &(0x7f00000001c0)={0x15, 0x65, 0xffff, 0xffff, 0x8, '9P2000.L'}, 0x15) r4 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x200000000008, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000140)={0x4, 0x3, 0x8000000000000}) sched_setattr(r1, &(0x7f0000000000)={0x30, 0x7, 0x0, 0xfffffffffffff800, 0x1, 0x9, 0x100000000, 0xfff}, 0x0) setsockopt(r4, 0xdb6, 0x8, &(0x7f0000000480)="2d78f4b2f719ac5fb2f2d85b1c4cd279cea8ef3092e218d68917e234f101a82af45e8a6e7e319248bddaa150a5d0c920237b62e3546e56a588c0fac1f8886358fb2730c59f5c9ba1934af2d0c9c4b86311a3ff763ecf7bfd8ff8bfd37e8c0ad74196cf640e269e04a32814eb44ff05ad9c7aa9f43fff2a4cc6e4ba23acbeeb4b3968e359842067127462dfaa77e7b1d316e4b4", 0x93) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 507.206634][ T4181] CPU: 0 PID: 4181 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 507.214565][ T4181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.224635][ T4181] Call Trace: [ 507.227944][ T4181] dump_stack+0x172/0x1f0 [ 507.232290][ T4181] should_fail.cold+0xa/0x15 [ 507.236892][ T4181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 507.242709][ T4181] ? ___might_sleep+0x163/0x280 [ 507.247582][ T4181] should_fail_alloc_page+0x50/0x60 17:31:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = syz_open_procfs(r0, &(0x7f0000000040)='net/kcm\x00\b\x00\xe6\x00\xbe\xe3O\xfd\xf0h4\xfdD\r\xcb\xfb\xe8[\xe0K/J\xefpk\x11}\xd6p\xf2\xfb\x12B\xd7\x1c\xd1\xa8\xb4]\x8d\xc9\xdd\xddSA\xaf\x1b(\x0f\xab\x1c\x18\x1d\xafXhQQqo\xba\xf5\x92\xd0\xa5\xb8Xt\x1c8\x86$\xef\x05\xe0\x93\xc8\x15\xee\x81\xaaG\aJ\xed\x06\x81\x87\xdbd\xd7j') preadv(r3, &(0x7f00000001c0), 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000200)={'veth0\x00', {0x2, 0x4e21, @multicast2}}) ioctl(0xffffffffffffffff, 0x8916, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) r5 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_destroy(0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(r5, 0x227c, 0x0) ioctl(r6, 0x8914, 0x0) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000240)=0x1d) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000400)="25189be01893c1e78e741180723237b0491ada8c414da0f30a9915bc5f95a30d4394b2730d37de9243acf96496edb4b63d7feda4d636b4eb74086bc0dbaaad6abd83acb8176978cc788691f64ed1c61091fa1d3e8fa0744c1de33f88a68bb64c9db39210ab35", 0x66, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) eventfd(0x8) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}, {0x2, 0x2, r1}, {0x2, 0x1, r1}, {0x2, 0x1, r1}, {0x2, 0x5, r1}, {0x2, 0x7, r1}, {0x2, 0x4, r1}, {0x2, 0x5, r1}], {0x4, 0x2}, [{0x8, 0x2, r2}, {0x8, 0x7, r2}, {0x8, 0x2, r2}, {0x8, 0x1, r2}, {0x8, 0x3, r2}], {0x10, 0x7}, {0x20, 0x2}}, 0x8c, 0x1) [ 507.252793][ T4181] __alloc_pages_nodemask+0x1a1/0x7e0 [ 507.258202][ T4181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 507.264027][ T4181] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 507.269763][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.276032][ T4181] ? __kmalloc_node+0x3d/0x70 [ 507.280717][ T4181] ? rcu_read_lock_sched_held+0x110/0x130 [ 507.280735][ T4181] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 507.280753][ T4181] alloc_pages_current+0x107/0x210 [ 507.280772][ T4181] push_pipe+0x3fc/0x7a0 [ 507.280796][ T4181] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 507.280811][ T4181] ? debug_check_no_obj_freed+0x200/0x464 [ 507.280834][ T4181] ? iov_iter_revert+0xaa0/0xaa0 [ 507.280849][ T4181] ? lockdep_hardirqs_on+0x418/0x5d0 [ 507.280864][ T4181] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 507.280877][ T4181] ? iov_iter_pipe+0xba/0x2f0 [ 507.280899][ T4181] default_file_splice_read+0x199/0x890 [ 507.292867][ T4181] ? free_unref_page+0x476/0x600 [ 507.292881][ T4181] ? __put_page+0x8d/0xd0 [ 507.292901][ T4181] ? trace_hardirqs_on+0x67/0x230 17:31:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 507.292920][ T4181] ? iter_file_splice_write+0xbe0/0xbe0 [ 507.292936][ T4181] ? __put_page+0x92/0xd0 [ 507.292953][ T4181] ? generic_pipe_buf_release+0x105/0x160 [ 507.292970][ T4181] ? direct_splice_actor+0x1a0/0x1a0 [ 507.292984][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.292999][ T4181] ? fsnotify+0x811/0xbc0 [ 507.293017][ T4181] ? fsnotify+0xbc0/0xbc0 [ 507.293032][ T4181] ? fsnotify_first_mark+0x210/0x210 [ 507.293049][ T4181] ? splice_shrink_spd+0xd0/0xd0 [ 507.293076][ T4181] ? security_file_permission+0x94/0x380 17:31:20 executing program 0 (fault-call:4 fault-nth:47): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 507.293096][ T4181] ? iter_file_splice_write+0xbe0/0xbe0 [ 507.293113][ T4181] do_splice_to+0x12a/0x190 [ 507.293132][ T4181] splice_direct_to_actor+0x2d2/0x970 [ 507.293152][ T4181] ? generic_pipe_buf_nosteal+0x10/0x10 [ 507.334430][ T4181] ? do_splice_to+0x190/0x190 [ 507.334454][ T4181] ? rw_verify_area+0x118/0x360 [ 507.334472][ T4181] do_splice_direct+0x1da/0x2a0 [ 507.334489][ T4181] ? splice_direct_to_actor+0x970/0x970 [ 507.334511][ T4181] ? rw_verify_area+0x118/0x360 [ 507.334529][ T4181] do_sendfile+0x597/0xd00 [ 507.334559][ T4181] ? do_compat_pwritev64+0x1c0/0x1c0 [ 507.334576][ T4181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 507.334594][ T4181] ? fput+0x1b/0x20 [ 507.349418][ T4181] __x64_sys_sendfile64+0x1dd/0x220 [ 507.349439][ T4181] ? __ia32_sys_sendfile+0x230/0x230 [ 507.349457][ T4181] ? do_syscall_64+0x26/0x610 [ 507.349472][ T4181] ? lockdep_hardirqs_on+0x418/0x5d0 [ 507.349488][ T4181] ? trace_hardirqs_on+0x67/0x230 [ 507.349507][ T4181] do_syscall_64+0x103/0x610 [ 507.349527][ T4181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.349539][ T4181] RIP: 0033:0x4582b9 [ 507.349554][ T4181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.349569][ T4181] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 507.370148][ T4181] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 507.370158][ T4181] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 507.370176][ T4181] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 507.370185][ T4181] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 507.370199][ T4181] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 [ 507.699497][ T4296] FAULT_INJECTION: forcing a failure. [ 507.699497][ T4296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 507.724697][ T4296] CPU: 0 PID: 4296 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 507.732723][ T4296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.742788][ T4296] Call Trace: [ 507.742815][ T4296] dump_stack+0x172/0x1f0 [ 507.742834][ T4296] should_fail.cold+0xa/0x15 [ 507.742850][ T4296] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 507.742866][ T4296] ? ___might_sleep+0x163/0x280 [ 507.742890][ T4296] should_fail_alloc_page+0x50/0x60 [ 507.742905][ T4296] __alloc_pages_nodemask+0x1a1/0x7e0 [ 507.742920][ T4296] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 507.742939][ T4296] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 507.742955][ T4296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.742976][ T4296] ? __kmalloc_node+0x3d/0x70 [ 507.742992][ T4296] ? rcu_read_lock_sched_held+0x110/0x130 [ 507.743007][ T4296] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 507.743026][ T4296] alloc_pages_current+0x107/0x210 [ 507.743044][ T4296] push_pipe+0x3fc/0x7a0 [ 507.743067][ T4296] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 507.743083][ T4296] ? debug_check_no_obj_freed+0x200/0x464 [ 507.743105][ T4296] ? iov_iter_revert+0xaa0/0xaa0 [ 507.743120][ T4296] ? lockdep_hardirqs_on+0x418/0x5d0 [ 507.743135][ T4296] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 507.743149][ T4296] ? iov_iter_pipe+0xba/0x2f0 [ 507.743179][ T4296] default_file_splice_read+0x199/0x890 [ 507.743201][ T4296] ? free_unref_page+0x476/0x600 [ 507.743212][ T4296] ? __put_page+0x8d/0xd0 [ 507.743232][ T4296] ? trace_hardirqs_on+0x67/0x230 [ 507.743248][ T4296] ? iter_file_splice_write+0xbe0/0xbe0 [ 507.743266][ T4296] ? __put_page+0x92/0xd0 [ 507.743285][ T4296] ? generic_pipe_buf_release+0x105/0x160 [ 507.743304][ T4296] ? direct_splice_actor+0x1a0/0x1a0 [ 507.743318][ T4296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.743334][ T4296] ? fsnotify+0x811/0xbc0 [ 507.743354][ T4296] ? fsnotify+0xbc0/0xbc0 [ 507.743371][ T4296] ? fsnotify_first_mark+0x210/0x210 [ 507.743388][ T4296] ? splice_shrink_spd+0xd0/0xd0 [ 507.743414][ T4296] ? security_file_permission+0x94/0x380 [ 507.743435][ T4296] ? iter_file_splice_write+0xbe0/0xbe0 [ 507.743452][ T4296] do_splice_to+0x12a/0x190 [ 507.743470][ T4296] splice_direct_to_actor+0x2d2/0x970 [ 507.743487][ T4296] ? generic_pipe_buf_nosteal+0x10/0x10 17:31:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 17:31:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x8000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000020040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gup_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00a3e48d148f09eb4447016744e03611e4be28b82c744fbc12938db7607b46b884fa9d37b82135f3c85ac1d232176edfe3c4"]) r1 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x2b5b, 0x10000, 0x3d7b, 0x9, 0xa, 0x0, 0x8, 0x10000, 0x6, 0x1000}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffff9, 0x6, 0x400, 0x7f, 0xb, 0x81, 0x4, 0x7ad9, 0x1ff, 0x4}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x301802, 0x0) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000140)) socket$key(0xf, 0x3, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x93, 0x0) 17:31:21 executing program 0 (fault-call:4 fault-nth:48): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 507.743508][ T4296] ? do_splice_to+0x190/0x190 [ 507.743528][ T4296] ? rw_verify_area+0x118/0x360 [ 507.743546][ T4296] do_splice_direct+0x1da/0x2a0 [ 507.743562][ T4296] ? splice_direct_to_actor+0x970/0x970 [ 507.743587][ T4296] ? rw_verify_area+0x118/0x360 [ 507.743616][ T4296] do_sendfile+0x597/0xd00 [ 507.743637][ T4296] ? do_compat_pwritev64+0x1c0/0x1c0 [ 507.743651][ T4296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 507.751415][ T4296] ? fput+0x1b/0x20 [ 507.751439][ T4296] __x64_sys_sendfile64+0x1dd/0x220 [ 507.761807][ T4296] ? __ia32_sys_sendfile+0x230/0x230 [ 507.761825][ T4296] ? do_syscall_64+0x26/0x610 [ 507.761840][ T4296] ? lockdep_hardirqs_on+0x418/0x5d0 [ 507.761857][ T4296] ? trace_hardirqs_on+0x67/0x230 [ 507.761876][ T4296] do_syscall_64+0x103/0x610 [ 507.761897][ T4296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.761909][ T4296] RIP: 0033:0x4582b9 [ 507.761925][ T4296] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 507.761933][ T4296] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 507.761948][ T4296] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 507.761956][ T4296] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 507.761965][ T4296] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 507.761974][ T4296] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 507.761982][ T4296] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 [ 508.168490][ T4386] FAULT_INJECTION: forcing a failure. [ 508.168490][ T4386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.181981][ T4386] CPU: 1 PID: 4386 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 508.189896][ T4386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.199963][ T4386] Call Trace: [ 508.203295][ T4386] dump_stack+0x172/0x1f0 [ 508.207741][ T4386] should_fail.cold+0xa/0x15 [ 508.212389][ T4386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.218213][ T4386] ? ___might_sleep+0x163/0x280 [ 508.223071][ T4386] should_fail_alloc_page+0x50/0x60 [ 508.228273][ T4386] __alloc_pages_nodemask+0x1a1/0x7e0 [ 508.233644][ T4386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.239451][ T4386] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 508.245205][ T4386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.251443][ T4386] ? __kmalloc_node+0x3d/0x70 [ 508.256104][ T4386] ? rcu_read_lock_sched_held+0x110/0x130 [ 508.261805][ T4386] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 508.268033][ T4386] alloc_pages_current+0x107/0x210 [ 508.273140][ T4386] push_pipe+0x3fc/0x7a0 [ 508.277373][ T4386] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 508.283004][ T4386] ? debug_check_no_obj_freed+0x200/0x464 [ 508.288726][ T4386] ? iov_iter_revert+0xaa0/0xaa0 [ 508.293661][ T4386] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.298959][ T4386] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 508.304669][ T4386] ? iov_iter_pipe+0xba/0x2f0 [ 508.309342][ T4386] default_file_splice_read+0x199/0x890 [ 508.314885][ T4386] ? free_unref_page+0x476/0x600 [ 508.319815][ T4386] ? __put_page+0x8d/0xd0 [ 508.324151][ T4386] ? trace_hardirqs_on+0x67/0x230 [ 508.329208][ T4386] ? iter_file_splice_write+0xbe0/0xbe0 [ 508.335092][ T4386] ? __put_page+0x92/0xd0 [ 508.339411][ T4386] ? generic_pipe_buf_release+0x105/0x160 [ 508.345213][ T4386] ? direct_splice_actor+0x1a0/0x1a0 [ 508.350499][ T4386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.356734][ T4386] ? fsnotify+0x811/0xbc0 [ 508.361061][ T4386] ? fsnotify+0xbc0/0xbc0 [ 508.365460][ T4386] ? fsnotify_first_mark+0x210/0x210 [ 508.370739][ T4386] ? splice_shrink_spd+0xd0/0xd0 [ 508.375707][ T4386] ? security_file_permission+0x94/0x380 [ 508.381351][ T4386] ? iter_file_splice_write+0xbe0/0xbe0 [ 508.386882][ T4386] do_splice_to+0x12a/0x190 [ 508.391373][ T4386] splice_direct_to_actor+0x2d2/0x970 [ 508.396730][ T4386] ? generic_pipe_buf_nosteal+0x10/0x10 [ 508.402261][ T4386] ? do_splice_to+0x190/0x190 [ 508.406942][ T4386] ? rw_verify_area+0x118/0x360 [ 508.411777][ T4386] do_splice_direct+0x1da/0x2a0 [ 508.416612][ T4386] ? splice_direct_to_actor+0x970/0x970 [ 508.422147][ T4386] ? rw_verify_area+0x118/0x360 [ 508.427001][ T4386] do_sendfile+0x597/0xd00 [ 508.431426][ T4386] ? do_compat_pwritev64+0x1c0/0x1c0 [ 508.436711][ T4386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 508.442941][ T4386] ? fput+0x1b/0x20 [ 508.446744][ T4386] __x64_sys_sendfile64+0x1dd/0x220 [ 508.453388][ T4386] ? __ia32_sys_sendfile+0x230/0x230 [ 508.460332][ T4386] ? do_syscall_64+0x26/0x610 [ 508.465023][ T4386] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.470303][ T4386] ? trace_hardirqs_on+0x67/0x230 [ 508.475335][ T4386] do_syscall_64+0x103/0x610 [ 508.479916][ T4386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.485812][ T4386] RIP: 0033:0x4582b9 [ 508.489736][ T4386] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.509327][ T4386] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:31:21 executing program 0 (fault-call:4 fault-nth:49): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 508.517729][ T4386] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 508.525725][ T4386] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 508.533840][ T4386] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 508.541799][ T4386] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 508.549780][ T4386] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 [ 508.743137][ T4396] FAULT_INJECTION: forcing a failure. [ 508.743137][ T4396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.812367][ T4396] CPU: 1 PID: 4396 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 508.820308][ T4396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.830375][ T4396] Call Trace: [ 508.833685][ T4396] dump_stack+0x172/0x1f0 [ 508.838066][ T4396] should_fail.cold+0xa/0x15 [ 508.842662][ T4396] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.848480][ T4396] ? ___might_sleep+0x163/0x280 [ 508.853354][ T4396] should_fail_alloc_page+0x50/0x60 [ 508.858561][ T4396] __alloc_pages_nodemask+0x1a1/0x7e0 [ 508.863946][ T4396] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.869787][ T4396] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 508.875525][ T4396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.881785][ T4396] ? __kmalloc_node+0x3d/0x70 [ 508.886492][ T4396] ? rcu_read_lock_sched_held+0x110/0x130 [ 508.892235][ T4396] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 508.898494][ T4396] alloc_pages_current+0x107/0x210 [ 508.903618][ T4396] push_pipe+0x3fc/0x7a0 [ 508.907878][ T4396] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 508.913543][ T4396] ? debug_check_no_obj_freed+0x200/0x464 [ 508.919290][ T4396] ? iov_iter_revert+0xaa0/0xaa0 [ 508.924238][ T4396] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.929537][ T4396] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 508.935284][ T4396] ? iov_iter_pipe+0xba/0x2f0 [ 508.939979][ T4396] default_file_splice_read+0x199/0x890 [ 508.945537][ T4396] ? free_unref_page+0x476/0x600 [ 508.950503][ T4396] ? __put_page+0x8d/0xd0 [ 508.954866][ T4396] ? trace_hardirqs_on+0x67/0x230 [ 508.959901][ T4396] ? iter_file_splice_write+0xbe0/0xbe0 [ 508.965455][ T4396] ? __put_page+0x92/0xd0 [ 508.969792][ T4396] ? generic_pipe_buf_release+0x105/0x160 [ 508.975519][ T4396] ? direct_splice_actor+0x1a0/0x1a0 [ 508.980811][ T4396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 508.987062][ T4396] ? fsnotify+0x811/0xbc0 [ 508.991410][ T4396] ? fsnotify+0xbc0/0xbc0 [ 508.995861][ T4396] ? fsnotify_first_mark+0x210/0x210 [ 509.001157][ T4396] ? splice_shrink_spd+0xd0/0xd0 [ 509.006144][ T4396] ? security_file_permission+0x94/0x380 [ 509.011797][ T4396] ? iter_file_splice_write+0xbe0/0xbe0 [ 509.017366][ T4396] do_splice_to+0x12a/0x190 [ 509.021893][ T4396] splice_direct_to_actor+0x2d2/0x970 [ 509.027283][ T4396] ? generic_pipe_buf_nosteal+0x10/0x10 [ 509.032849][ T4396] ? do_splice_to+0x190/0x190 [ 509.037547][ T4396] ? rw_verify_area+0x118/0x360 [ 509.042518][ T4396] do_splice_direct+0x1da/0x2a0 [ 509.047386][ T4396] ? splice_direct_to_actor+0x970/0x970 [ 509.052959][ T4396] ? rw_verify_area+0x118/0x360 [ 509.057821][ T4396] do_sendfile+0x597/0xd00 [ 509.062257][ T4396] ? do_compat_pwritev64+0x1c0/0x1c0 [ 509.067550][ T4396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 509.073799][ T4396] ? fput+0x1b/0x20 [ 509.077620][ T4396] __x64_sys_sendfile64+0x1dd/0x220 [ 509.082836][ T4396] ? __ia32_sys_sendfile+0x230/0x230 [ 509.088149][ T4396] ? do_syscall_64+0x26/0x610 [ 509.092840][ T4396] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.098131][ T4396] ? trace_hardirqs_on+0x67/0x230 [ 509.103187][ T4396] do_syscall_64+0x103/0x610 [ 509.107790][ T4396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.113687][ T4396] RIP: 0033:0x4582b9 [ 509.117593][ T4396] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.137210][ T4396] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 509.145640][ T4396] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 509.153642][ T4396] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x94, 0x0) 17:31:22 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 509.161622][ T4396] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 509.169615][ T4396] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 509.177678][ T4396] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcK\x91UV') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) splice(r0, &(0x7f0000000000), r0, 0xfffffffffffffffe, 0x54c04b31, 0x4) 17:31:22 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x48000, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000140)=""/144) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x95, 0x0) 17:31:22 executing program 0 (fault-call:4 fault-nth:50): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:22 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 509.511587][ T4517] FAULT_INJECTION: forcing a failure. [ 509.511587][ T4517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:31:22 executing program 1: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setown(r0, 0x8, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) openat(r2, &(0x7f0000000140)='./file0\x00', 0x41, 0x16a) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r2, 0x5, 0x3}, 0x10) 17:31:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x96, 0x0) [ 509.557858][ T4517] CPU: 0 PID: 4517 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 509.565799][ T4517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.575865][ T4517] Call Trace: [ 509.579225][ T4517] dump_stack+0x172/0x1f0 [ 509.583584][ T4517] should_fail.cold+0xa/0x15 [ 509.588214][ T4517] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 509.594037][ T4517] ? ___might_sleep+0x163/0x280 [ 509.594061][ T4517] should_fail_alloc_page+0x50/0x60 [ 509.594075][ T4517] __alloc_pages_nodemask+0x1a1/0x7e0 [ 509.594091][ T4517] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 509.594108][ T4517] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 509.594123][ T4517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.594144][ T4517] ? __kmalloc_node+0x3d/0x70 [ 509.594160][ T4517] ? rcu_read_lock_sched_held+0x110/0x130 [ 509.594183][ T4517] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 509.594206][ T4517] alloc_pages_current+0x107/0x210 [ 509.594227][ T4517] push_pipe+0x3fc/0x7a0 [ 509.615451][ T4517] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 509.659153][ T4517] ? debug_check_no_obj_freed+0x200/0x464 [ 509.664918][ T4517] ? iov_iter_revert+0xaa0/0xaa0 [ 509.669867][ T4517] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.675182][ T4517] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 509.680934][ T4517] ? iov_iter_pipe+0xba/0x2f0 [ 509.685643][ T4517] default_file_splice_read+0x199/0x890 [ 509.691234][ T4517] ? free_unref_page+0x476/0x600 [ 509.696278][ T4517] ? __put_page+0x8d/0xd0 [ 509.700630][ T4517] ? trace_hardirqs_on+0x67/0x230 17:31:22 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 509.705672][ T4517] ? iter_file_splice_write+0xbe0/0xbe0 [ 509.711252][ T4517] ? __put_page+0x92/0xd0 [ 509.715597][ T4517] ? generic_pipe_buf_release+0x105/0x160 [ 509.721334][ T4517] ? direct_splice_actor+0x1a0/0x1a0 [ 509.726648][ T4517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.732899][ T4517] ? fsnotify+0x811/0xbc0 [ 509.737253][ T4517] ? fsnotify+0xbc0/0xbc0 [ 509.741603][ T4517] ? fsnotify_first_mark+0x210/0x210 [ 509.746904][ T4517] ? splice_shrink_spd+0xd0/0xd0 [ 509.751891][ T4517] ? security_file_permission+0x94/0x380 17:31:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x97, 0x0) [ 509.757544][ T4517] ? iter_file_splice_write+0xbe0/0xbe0 [ 509.763104][ T4517] do_splice_to+0x12a/0x190 [ 509.767629][ T4517] splice_direct_to_actor+0x2d2/0x970 [ 509.773028][ T4517] ? generic_pipe_buf_nosteal+0x10/0x10 [ 509.778599][ T4517] ? do_splice_to+0x190/0x190 [ 509.783336][ T4517] ? rw_verify_area+0x118/0x360 [ 509.788226][ T4517] do_splice_direct+0x1da/0x2a0 [ 509.793096][ T4517] ? splice_direct_to_actor+0x970/0x970 [ 509.798675][ T4517] ? rw_verify_area+0x118/0x360 [ 509.803556][ T4517] do_sendfile+0x597/0xd00 [ 509.808025][ T4517] ? do_compat_pwritev64+0x1c0/0x1c0 [ 509.808046][ T4517] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 509.808064][ T4517] ? fput+0x1b/0x20 [ 509.823394][ T4517] __x64_sys_sendfile64+0x1dd/0x220 [ 509.828617][ T4517] ? __ia32_sys_sendfile+0x230/0x230 [ 509.833919][ T4517] ? do_syscall_64+0x26/0x610 [ 509.838611][ T4517] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.838631][ T4517] ? trace_hardirqs_on+0x67/0x230 [ 509.838651][ T4517] do_syscall_64+0x103/0x610 [ 509.838671][ T4517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.838683][ T4517] RIP: 0033:0x4582b9 [ 509.838697][ T4517] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.838706][ T4517] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 509.838720][ T4517] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 509.838728][ T4517] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000040)={0x4, 0x5, 0x9f, 0x10, 0x9, 0x6e, 0x8}) write$sndseq(r1, &(0x7f0000000140)=[{0x5, 0x40, 0xffffffff, 0x7, @tick=0x5, {0x7, 0x3f}, {0x10001, 0x28000}, @queue={0x7a, {0x3ff, 0x7808}}}, {0x7ff, 0x0, 0x7, 0x4, @time={0x0, 0x989680}, {0x40, 0x80000000}, {0x3, 0x7}, @raw32={[0x0, 0x800, 0x9]}}, {0x8, 0x5, 0x8, 0x8, @time={0x0, 0x1c9c380}, {0x80000000, 0x8}, {0x0, 0xfffffffffffffffc}, @addr={0x71, 0x2}}, {0x2, 0x9, 0x5237, 0x1000, @tick=0x4, {0x3, 0x8000}, {0x800, 0x1f}, @connect={{0x6, 0xfffffffffffffffe}, {0x9, 0x1}}}], 0xc0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@remote={[], 0x0}, 0x7, 'vcan0\x00'}) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000280)=[0x1, 0xfffffffffffff1c6]) 17:31:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f01643d", @ANYRESDEC=0x0, @ANYBLOB="2c004562633f9d6b509cfeaaaf2a5e0a1fd10c473a25875cf1049ff1b0b8d9f620686f214d41398ce9880c4196bed91a02431f9071e33a71dfac3befb74fe009906abadc667bc80762a0c1703fcd7dc26b3353da6d35f743e7372a471b1a7bf509a189074f71da42f0c025e9ed49d9acd06f64c39191c9f29c3637fc02d42ebdd4cf8b8b30c768a7ae3c7f84c38dab045258276207ee3b27d598d733a489c02603311c3d9fc512c2be1df03b9bf4e7b76c565500"/195]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x50040, 0x0) getpeername$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) 17:31:23 executing program 0 (fault-call:4 fault-nth:51): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 509.838736][ T4517] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 509.838753][ T4517] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 509.891538][ T4517] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x98, 0x0) 17:31:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x80) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000100)=0x100) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000140)) 17:31:23 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00bcefa8ead4128daf92f2cf3bda254b372ec4e1381ee6acc2b0556b078f5e84dea7983ac0e6e4f6a11e7403ffd24ac4b13874450de4c5fd10fd1070a1a6fe16fd5df353232c19675efbcbd006da4caa4f24c0e07d954fd9df"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffda, 0x3}, 0x10) [ 510.130805][ T4647] FAULT_INJECTION: forcing a failure. [ 510.130805][ T4647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.203988][ T4647] CPU: 0 PID: 4647 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 510.211929][ T4647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.222008][ T4647] Call Trace: [ 510.225317][ T4647] dump_stack+0x172/0x1f0 [ 510.229668][ T4647] should_fail.cold+0xa/0x15 [ 510.234279][ T4647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 510.240209][ T4647] ? ___might_sleep+0x163/0x280 [ 510.245091][ T4647] should_fail_alloc_page+0x50/0x60 [ 510.250311][ T4647] __alloc_pages_nodemask+0x1a1/0x7e0 [ 510.255702][ T4647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 510.261534][ T4647] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 510.267273][ T4647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.273544][ T4647] ? __kmalloc_node+0x3d/0x70 [ 510.278242][ T4647] ? rcu_read_lock_sched_held+0x110/0x130 [ 510.283975][ T4647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 510.290243][ T4647] alloc_pages_current+0x107/0x210 [ 510.295375][ T4647] push_pipe+0x3fc/0x7a0 [ 510.299644][ T4647] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 510.305299][ T4647] ? debug_check_no_obj_freed+0x200/0x464 [ 510.311056][ T4647] ? iov_iter_revert+0xaa0/0xaa0 [ 510.316012][ T4647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.316030][ T4647] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 510.316043][ T4647] ? iov_iter_pipe+0xba/0x2f0 [ 510.316061][ T4647] default_file_splice_read+0x199/0x890 [ 510.316076][ T4647] ? free_unref_page+0x476/0x600 [ 510.316086][ T4647] ? __put_page+0x8d/0xd0 [ 510.316104][ T4647] ? trace_hardirqs_on+0x67/0x230 17:31:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x99, 0x0) [ 510.316118][ T4647] ? iter_file_splice_write+0xbe0/0xbe0 [ 510.316143][ T4647] ? __put_page+0x92/0xd0 [ 510.327167][ T4647] ? generic_pipe_buf_release+0x105/0x160 [ 510.327201][ T4647] ? direct_splice_actor+0x1a0/0x1a0 [ 510.327215][ T4647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.327229][ T4647] ? fsnotify+0x811/0xbc0 [ 510.327247][ T4647] ? fsnotify+0xbc0/0xbc0 [ 510.327263][ T4647] ? fsnotify_first_mark+0x210/0x210 [ 510.327283][ T4647] ? splice_shrink_spd+0xd0/0xd0 [ 510.397673][ T4647] ? security_file_permission+0x94/0x380 17:31:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:23 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 510.403330][ T4647] ? iter_file_splice_write+0xbe0/0xbe0 [ 510.408889][ T4647] do_splice_to+0x12a/0x190 [ 510.413407][ T4647] splice_direct_to_actor+0x2d2/0x970 [ 510.418795][ T4647] ? generic_pipe_buf_nosteal+0x10/0x10 [ 510.424362][ T4647] ? do_splice_to+0x190/0x190 [ 510.429069][ T4647] ? rw_verify_area+0x118/0x360 [ 510.433931][ T4647] do_splice_direct+0x1da/0x2a0 [ 510.438806][ T4647] ? splice_direct_to_actor+0x970/0x970 [ 510.444387][ T4647] ? rw_verify_area+0x118/0x360 [ 510.450721][ T4647] do_sendfile+0x597/0xd00 [ 510.455166][ T4647] ? do_compat_pwritev64+0x1c0/0x1c0 [ 510.460492][ T4647] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 510.466745][ T4647] ? fput+0x1b/0x20 [ 510.470562][ T4647] __x64_sys_sendfile64+0x1dd/0x220 [ 510.470581][ T4647] ? __ia32_sys_sendfile+0x230/0x230 [ 510.470596][ T4647] ? do_syscall_64+0x26/0x610 [ 510.470612][ T4647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.470629][ T4647] ? trace_hardirqs_on+0x67/0x230 [ 510.470652][ T4647] do_syscall_64+0x103/0x610 [ 510.500835][ T4647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.506743][ T4647] RIP: 0033:0x4582b9 [ 510.510640][ T4647] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.510650][ T4647] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 510.510665][ T4647] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 510.510673][ T4647] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000080)={0x2c, 0x4, r1, 0x8, r0}, 0x10) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x1, 0x0) 17:31:23 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffffd, 0x8001) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000001c0)='\x00', 0xffffffffffffffff}, 0x30) r4 = getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003c40)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003c80)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000003d80)=0xe8) r7 = getegid() r8 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000003dc0), &(0x7f0000003e00), &(0x7f0000003e40)=0x0) r10 = getegid() sendmsg$netlink(r0, &(0x7f0000003f80)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003c00)=[{&(0x7f00000003c0)={0xcc, 0x14, 0x800, 0x70bd28, 0x25dfdbfe, "", [@generic="031421edbb7349d46bb5454e033328e7965861900ce6dc846da5a19cdc31ee7422fa09bb5afd180da6241e202c8413f0d8f914418e79adf6c0b76f1789b40be8a3b69455666df7a172757fc34106c9aae1c4b66a26fa612dd39898ccb55fa23d9ad14a11ba220aa5632239d462c2693119b921623f4058faafa720ce7bd42f1013093e6723018ba73ba259fe25670f9d4840ceaaa1751454d625188ffc66bde995f7e00dae0a97101691c5a5516bf6cbaf7525710b79b4", @typed={0x4, 0x88}]}, 0xcc}, {&(0x7f00000004c0)={0x530, 0x20, 0x300, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x80, @ipv4=@remote}, @generic="2738567d2571eff7091f5311d39161a40743f8df8e071a651a9c31005a67814a77a73233c122e52d35f698d0305cb9e43fb4ec02ddb7c0d1b259271611562eaddd72f0c88e243e294ccce0537f86d15a10e3d4f4fa6964cf1ef4f475fe23583088", @generic="ab0fe9e830d3a2efe55aadaa0b5c2044a0ea663f72766b3b70c358beb5a3a87bea6b40aed54cb3d498005871d1649697eeee89aded7007c0a15ee39f523e61da14666166c92bf0c7cf113b3132c9f1cfc34b71eae7403b2617954308cb975aa4a1014e36700d290847cd16597ed77438e7821bc55fa8847f09cc09863c70f5f561a675dfc267ca09", @typed={0xec, 0x90, @binary="a6c139224e0723cabc201731af91f00422b68c2503c65e748f9826f9707f0e89c8356a8067061f86a00a6329370a3d71e1a1dc4bd0e380009f0c39d2bac2818ea269be7f7260a774aafef882523d187a176fe3143768df7a38d95dab9a41cbfa3d013aa974c8e9966bbd55101cf64b8fdb81e30b5a4bf050375c80849cccfca45c79a80da52aa8b1dd3443b79d017a72264ffad9e0116034f0a418ca76f4269babed5a5af9b72185f5e4556f91032f17269a66c87810756d545e270591a9bbc7d3c1cd623c4ed47c38fb74d2947ab697e5486e0ebeaf61f8686dd5f575eb1308587ab28d2a80a1"}, @nested={0x1dc, 0x6b, [@typed={0x14, 0x29, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="851e4f5bc0a36dc067e2e15dba151047669620307909ad288f9e9e0fbac6a3b7c86bafdf8663d66e96f019027c25c3cb7ba4d02adc016f9684afa0e3d5888d5a48c930de471ba7a83e38ac1b57cbabf5937171849b2cf80b054db98de265255733ca06b28e57831c8a39d41a91120e3ad66cf1da639de318375b662c0d823d73db9567f7698f41a781fa319af54ad86a5f0fe865ca36206e5dd32ccb4d650c300fbf3da6e06ca7efb41d72", @typed={0x8, 0x94, @ipv4=@remote}, @generic="d9f5d24e0c1b1065ecd041fd36d5e7d2147a92ec9a76b0b2bce9f8e0d9584014bdfaba280d5083ded2166e179b10e9bf60b699e8540b4f4a8d82f173ddb280f67c7bb6d2cb0d7844920ac9edc3bc4696", @typed={0xc, 0x79, @u64=0x5}, @typed={0x10, 0x2e, @str='/dev/fuse\x00'}, @generic="8a6f61b78b1eaaae76c50fac39c30d70ce22ea8754be4b588a5c4fc287fb2f90d401e14120d262160c637208aedfb4ac843b7a3703c8b4dfe825df6d547919b2195e2d929cccdc89fc09706f190869ebb5a75a9fd988c8022b14010984127a14595c0cfc3d8dd5ee55a83d0708595220f3dc3573313c4a0328109d9a5874bc3812d4b9e65e4d895e87d8eb9caf629d750f89f816048b07e8baaf5b73a235b5a1ca617cefbe"]}, @nested={0x8, 0x87, [@typed={0x4, 0x2e}]}, @nested={0x154, 0x67, [@typed={0x4, 0x23}, @typed={0x8, 0x8c, @u32=0xf12}, @typed={0x8, 0x2d, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="771e4bebc2d73f", @typed={0x8, 0x1e, @uid=r2}, @generic="9fdc0783d7cf8d819496c17f1d8a5fc6ed8e12473ed28fe2b1553de5620765bb22592b595c4dc229d00124a543c117b48b39cad3973ada70891cc1c983998365c18049398ea79b49f46b289b192b36bcbf31576587e002b0f65ef345167e2f48ddf5b92987e9fdac24599ef68c139095b39aea24ba7d8ed8e4883cd52bf466036950aa8459541356588eac4065ce02d4b9d040163c876d88a892228fc9ec86b06f8b0ebb3bdf8d", @generic="a28ab1bb522c9b46464418e2e9f801059a43b9e4b01beeb5ec4e00a14b3d7e3be964382edd155a74b070f240", @typed={0x8, 0x7f, @pid=r3}, @generic="d117c2504944ef3c25cc3d488da2dc1e9c98d788966f79b64b1f1fe8b84ce14b2faad329d9a95370808524f152855f2d0b0fb06f80aa4d2c23181c199358993007fb6a14d6f5cc72f01bece4ca422abc6e8b"]}, @typed={0x8, 0x67, @u32=0x9a5a}]}, 0x530}, {&(0x7f0000000a00)={0x31cc, 0x2f, 0xb02, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8, 0x75, @pid=r4}, @nested={0x31b4, 0x2b, [@typed={0x1004, 0x1c, @binary="d4a623994dff00c4c8e71ab7786d629148d5e092b914a44d8f227bb7491f34fb2a1637dd12586c540089a6345eeed49c0614d401e7917a8a69fda886f6cb314385c32c6d5c06cc2a10748fcf2f8c26cb208c7aca9021e8479fe10f5f644eb65de871c07d05d49f2155d7fce15a586ab8148a7d0fdfb2fb60ac01aadbd3c31700689d7481828f21ab027868dd5813647f0bc0e97ce245710055a3416308db6b98c557e194fc472822b9d6e0677a03ee239985a69e7dc2198c12cfc87a7e9b5adcbae94fc1a618dcd33ed493137cbe50a346661d4a6d589cb7030b53e72dd18c61e7d601d215ef7d7e0c0a6e9f362ecf60789631b5c6e52e00ffbc3d7eb13f155b08f0b147e73c969d17d5fe7bb7c606957d19bda1c995dcf67df26f04b42591bc2f3f61f3224ec73f38b3ddf8462103bd38ff422b4316c2bcfe84e2fb48b5476348467aa204bc4b4bca7f3a30f47e74c365158d19f30c755838ccaf6f5cd27f536eaa3d351cbdbc2e8ee3faf2495c4fbcf72b2aa42d20c2550ea3d79e2c98d7a6a279c3abedf40d6f101cf3ea052e8d2cd2625745980bd634bee1e9190ddd0e6b4b0661e3fa790832975a513496c6b2bd69dd1931dd40376448861328f41ce00cc0315d2f34ed3ccfd731eeb032cb7da50c65bd789b506c4c53c3f98465011d7dae55168dcb18a6c8da1c286c7b866abc68e34115a80bbbef6e27f7526978588bcf04824d2f76f07af1aaae5744f838808c3f3803362b6823f258c1da1b05cf8750c0215a1b276e8eed185d16bf14e8c27a403d9be66690ff169d0f9b3e8ad9d06b5442c299c3cc456bd69ad81b37959cfb65f7f9796f7dbac26535503f2a09486a89aedb19f4d13e40538428dcbe63c7284f3cf74ac00a4b51099b43117d587ad32f093dfd9a75c2deb4d8368c0034ddba777bab3d687f766db9a3eab6367112f0ffd0b34c6535e6a84db119a634a82ef8c5d0f105e2c1a714a6bab5834d239a2f2a5a1e057d628c3b45676d805fd4f5973d413de12f4de9d1820dc1734acce64281e64008bdfc6ec5bba05297c981283e98d2f8d33c19fc6c1b7f3047e71e30144a773d5dd12d75c64f8f7156579cf21175a2000f4903034ab9252cf39ed5f26adb01de1c12fea7f8856c3e986ba815ed6e0b8eb3b7de729940ff8be84c75d0987b13538a64e49d09843d46ca0eea52679d0a08a8c8c4cc02a8554c1831929d8cadacde350f0d948fc1e1ed1646bf8761272a7770f5ea4e30af57394d6e7b920689425f46120043ff2e01e265153a9079155b4d53bf577347c1af20ebd3637d24341a7f6788b34af6a7ea98692afad7277d19c3c0c1bd6db357bd0deb258717d936fbecaec1114f8a0e990311d30a1bc559cf883fc8d2703013e393055806776f5ae92f32ee9f5e05c56c12ef01769e499ac77e4bdef1bb50aed5ae2fa635cc2e9f7ccc72db6eb057be5016f6f9a5880d2e7c557e943675fbd977848d36645c246fa4d7ed4c18da34386957f87044e25727549c2f895f526bf209d13fb5e9576b04fbd7a75a80b98ec2ac7a125309deb3d991bc5f465453c501d7a6be239ab956eaea3a7e9943b577b000994551b11fdcc4b0e2099e33ffed519cfcf3e5cd10488282469fdf83d7668ec6174d3630f5d3442529c5d71116e00fca406c3fe6a6e5bbd7f5112005c24ae29acb57806f5fe21b2e93efe44276b02cf72ac272736460d65832b891fffdc1377f99cb4eecaf66162d45acb90d62582552ab816a4ddd4bce96cc22b58bb124084a6f943935c0eeea052697b1650c18a9af22486114679e194e13e481c59a0901c77be3d7d52e92fe9181ae338283571173d3631a94d4b3684d82d3e12071ba6246f8e4622cfb9966ac86073b35ea5c42fadda1c45786633e685d592cf7240d0c44a09bc1de27f03dfdcf13c057edd50ef2f46230831d282b17ee8d8cbb1aa254722efe5b15ac2ff9eafa83819c8d6e9cddf3381a431bfbdea3cdf508452b84598f34689cfabb7e531136fe7e511d18661aae63c207c870e798af8daa741b9b1d55944e57914d44efc480bdd5ed076b9f2eb3fcea1efc0c8ff963a3fc79d23891190d7082f9d58c8b4ec927a3e030ac1870cd0846e1f339a9757457adfd0d915a07b7c0bcfac6f2a61bea8c7928d273d4283543f8b659f509696dae4bfb5cb30241184d42383ce4b7dd0ed4a1ef78f2c60eb3a16befaf648dea4043c0820d91f01485a76e355a2d82f08c4aa55151859ef64b50ead99b568295de75a69a3bafc955eade1863a0212abdb43b4be748d3e3bb7347d18d0dc76c096faa8271aeab2524e8ee07b9904ca5819682c302b6f31ad9006563b8391bd4d0d8469c5cd0c6d8f3d5647dfc9b434f7bd356545ab11d8d2acfea51f365c0792bb9917f37e0dfc4e12c016ca0bba201a3f7f6e1fe391c73c414b7e811e8382e2a4219018b64b86b387404ae0afbc0bd710302d6fc6624d48e0cf23e9242580fd2eda9ab7a46bf732fbd04383cb5375ed23b4b69c4dd1d5b9a74f6a762e082ca9b2c0a913c73b40d9f80b6b2579975249d5952f1c1ac88aa2c048bc0a799123de9959fd49fb0b07260da018d1a55c592d297f95122db32e49c96eff44b8028c44f1241d5577659cf0d8a8586abc8855ba92d8fdbb2b3e45eeb9e4bf27f01b96f3ea13601e6f04a9b5f9e4b1dff200b59eeb8a22d05c8bf1ff9880382db6cf999275477a335bd193912bd62915e51a0c75ad7147b86b913c1b5959abb0360d9acacd4ff4e7968bd612ec691c879e4a2bd483e7ae86c0ceed1b9435d848ac9e6b9f03083b2fba08e8fa1c36fcd9540e12329adc4b58ff901955f718f48c905d9648a670c470180bfb409f6a8ecfa11956a45d06bfbc893add92193800b01ac9ccf0e60e5bf8460fb72efe9cb88f5a7d0464a5902f799a712e3c19b6bd4ae63286f884056cbc4f93da1b79d8685963325610711387f054cc920406821e28153fe3b062a44f65fb3363a9b5d52eabb3e2744afdb8c6aa8ca4a810550823ce0a1d2efc957788b3766b6257738e0842e64b8967d1242257ad8b6594e00093acc64adf6993178253a97b9d4a5a0f639dc09efe92571fac9f4bb5b0f8563a73c2cb4d435a5cf7eaeb6358368ab93aefd5c258b9660e820e6974c4c78d576981ed54151ac2cf3c1eb97183213baa74a1715d66e675072f48569efbb678f06262707b014b1fb6f4a218656d2f46ac4ee8be30d555437e1bb67f81f0eea84f3489c52ba8ac023d74fa2dba8588e06220020c6a4ae3fc60442e3f9a1d3c087a7d2dd702dd6fa89645a8d5c51134b58c54975cf6f209a728a165231e9ceccaeaadb19c7ee42f74eb0bcb3c6c4bff9de44a05d98b8b2d176519409d47c0ed1af9204b5cb3e08c271b96dc8dd5dd8ea02bb03d9d655c56f481b483937c010e22a03f9881e41a2a22b1de7e1d62a4a1633508e249091f7808e93829a016d7b566b959542ba05cd3efb6747513f4d8a689a0be95305b2107e6235aa31629b946e06f7862eff1594c93796e906d6e1e8ab172093983ee19a3f64cf21c6b457382b9cbe2a25830e6f95bcc71629438229cd25f2978579a7776f8910ebd0db9917878a0480f2ecbdb90229363034cfb6813cb115bcc181f577d3ff9dc0bcafc97a11d263a78ae9ad5e9e6f4ab73e8488307584f774671e5151ffa84e19e9875de773bce70d137aa9d3ab017fd218d2f19ed7c25797d52a5d5888c8b9ab8546749ee08c5e50a20a3488c0315c111869d0effeba7b1bfa5c9b84531b74b1076fef4199866d90b13dfec44daf9ee60d337562c880b0888fbc43a2a9b3649dec2e9f4b8b7f55330f788fcdfeabd38ae14e37a817b3bd805080e14a7c1a87d2ef1c8acf8fb91c48c9f4d7a1d9d5dac1e29718c10ca7e77bb493b8ac11dc7abc63df8d3a36ab215b5ffcecd83471ddf55c5e6e2cddcc93f7072e73f89507b6900ae49e92af31cd2ec43a4edc1d3f08bfa2065e01c31b3902dc1777541aea491dc7811b2e56b349349202d2a1a4c7c08957d5e1dd35b91c7abd605815ae1164d0202d3ff0bf7bab1f7b1733034c6ff2709f3f59525138ab73f121cffd0b8dbde6ca37e1db22cb0af3e990b51e7b60175c862d9e02a4038c7f1746b8734fc574400aba3d9176a58d588b2832960eb776010e59833a995ed0e260215e9837d7c6f118f6014110735bca4f7dff3bf0596f1763b1ed9829cf20b3cbc82a6044503fdc5f5e5d0957aab8724b8e89a4bb36884fb04df474d24bbcf61e1eb946eaf51e13f9a2a8fbeb0fa16f99f5355ad82fc35c928e29a46e873945ecf1f46c66c8f477f6c9dac4977361d5b10cfcb2f3fd4e08cf586f072cbb1a2034764acc3f53e939213d9bcd07baa16701f2ac408cb1d450f4a869c7467746e173739d120674e8873eae0d0d79f3e342feccd0edd175278e13a3560d15b2133099228fa28d5d5ac34b3857e1dd56b89e5faedad12742bdf1b581b81d8d3887cc75df08891d1920d40c50a7afd508ab1769c5a457e3997cb2c592eab2156e1af476dd79323e5cd060896c40f6f7806ce35d09f4099ab6a9dfc30994d804670a31f5acd68703aa04f45ed74fce258820c2bdff50ea92a1615845304d5bc4d2c5b2cfe713dcbf30e88fbf9f8e8dfa3fdc6e341de307f689dc2b476e04717b9c97302bdd97de0d3cccb08a31d9b423c3ba49be7bbef2173953d5c62e72f17854f3b256925679cc7bcf3e245a28ffc04903e3150c1824a21914ccd139fea775ef3556fab99fbe1c066d382f81e3a07267d3a6de5f4bd283e36944e5acdaebd90ceaea7172c466f588063273b135063fe2e0d86be8ffade1951cfdc9aa3a1afc165895b6d702f4bc715f8573d1b00fd1d66d19cf4780ac50dea377a9ed2ddc68f1826877c1da5268476a9de00583aa2dc08d950caae0c6a131cc709fe3be922ea3f35d042c070097579c7417a4e5b7a30f5bf4c1abcb52e81b078a22fcdaf4d1b108370976729faf06e16c1282c1c401512b51da027d21933631f7e943da27ecca213c8f92b51adebd7af42148b014e4d666e7ae2b1888377d54306278ca038444768511e8db03425716b2342337ca9c30c73e40df3612b055ca7f8c18cefa4b7d3f2202ce52031ac02d0d6e7934e9b6165ecf4b301377ede063ffc659265127acadbf97d2ccb29a775b600ebf71715e3be29cf76d24b7634490d58be2b962c15903154eb6b53e00cbce3d3a657742d49e7e598862178ea591c1542edc98f68617b8e08d6d5987203965e125b6fba6d04c34813548afacc890d57d403613985c41f127b89c4c6d23fcf418a9f6c49be8e741530cdffe2e42554952f5d0c272ef2bdbd0d3c934e86b08ef13dbc9acaffc7dc871fdadce56392cb9a7fffd35d7321b46a12e5334bc7e6496bb632a39d2a859ae7e46849c4fd0889c3efeb621b47cee085b9485b21c323c72b208b246ef8ba406348562d36ea4a3af5ce2817ffc9c62e2962554bbf64298e58a1f1aa6c93a27ec733fe6d6498df6ec747c73eaaf854e478aade30e21b4b991ee31a00e4a15e1f66b3a56c5e4eced4d218e80b1e9c651ed382f4de6f1333382b430b3e279abc53d182167db57571597a077390cec310af479132720349513c9f1d6117c0b5d5abd963fd83fdd6a8a7e4b8d00a1d4b3bb36a5f3f9aea434cec2482f763c527b3d195d0fb7492e033ff9bec2e311c1b2417df72a0fd4ba9fa2dabc24a5df93495c44aa18547685c70e7f990108a615a17fe54033d700369da3c999ad82a76298c0b0524b0f19"}, @generic="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", @generic="c88790ed055936a716446ece65cd0fd14b8453fb779db8d2d046e997c47961f8c509ca72f72fd6ced93b3e6b2fea995d8a48e0cf476938fef996def3c68b532260c6e01d71dff73870819e08401a", @generic="c32ea570393db62cb2be1c95fcfed1fbb3836060772c0af4db63a5e8f03dc2e1ee3d9d95a665dda57e79f035f62094726520c2cff3a359fc19589adcf3e4b75717a6f01b42c87e5a63af8a3821e29811de195226d06f137732e8dbc77ace427f6d3891bb817283d781abe16241cb043e668c5d8cf745", @generic="559da70bfa75b8b0b91aeb99bff669b2612980d53b5939b6c5d53977429ccca0d7dd9de14a62aeed9c6f52948ed846d24fbf7d2ce24222abb11978bc69878ff34b024200bf479ce58f691afdf13404caad403bc4fee16a91cba5fe4b55272805ed54b4a7fe0db06bf065ed27366d578643107433a190fe509f36d3ec2b6ac893632362f8962dca74e5616a2aa8fcffa33c66f0bbcd84894065c88ebb175974f23d1691ba8d1c9f82576235595d4a1dee7f5c696cdd", @generic="4c2ede92b366cd60fc4661310af41a25ddeaa483afde58ddc46baed87756d98b2ef54a910fa20e7684e06240a2ba4341056223950c1712e2fdedb110bada95074ac92306982569e1f1830411c98ad4f88d86d2e3862d8e0982789fc85312dd10a5192ce1b2f4e8613dba9f72dd2d99cf956e7a0cfe5e2e716e13d43d2eac81786928ea6e1dcf28c8135f652a510cdde5ddff2268e8c38b57f52436516c52daa9dbc4415d017995ae7a7def8302ebb0a3196d7a4b19558cc5a983ed88b2f70c8ba9e8df5d8d9f90dea671157015074001f2a54674698bb8965a91ccf3465eb55b61eabba0d1bf416e71a133ff8c1808dc3cdc65468ee89f5e89028ff3b3532569f44f910b2737865b5aae4702c967d60d3594971690adfdab54c2d2b4546bbbfa424fc99bbb1f60f6e60585f2aaed1908319e2f87483c55cc921add61129e6ec7a265d94fa001f27588e6deefd29bc9d3a5e06f89e33ea4e2d2267a25a53beff5bb5d7a753c8247e7a35e6c8380aa298400c15cf45f0d5798eb75dc820bee0bb322bb3ee9207691164c368ea37fad19ba0924a95cf1f450d4aa75a0302f9072694269f668e6c378e0f59c2f30c7250393c4c75d00546b2cf7d7fa522bdd3ba1757953e5bde8e6f664a3476538ea61e4a9fbfb7d6d36d371df9e239df8b238b2f11b6b62b0fcf97e04999d918b3ae34445c57ce8add5d68aeeaeac6631e1f6aad3823b28bb6db7ee8db23da98e0163be15cfe277c8797fbdc96ccee2e892c8b875440981c281594160ceb6bb68e21fdfa05cad797297bbc29c5cd6c05276332e7ed0bf5a46e0bd2f92e324d56b7db120c529d7bf379abeef71d1f153bb7d00011501847323efb09fa1293457851ac061cde05fe02954945f0b525137e3da5a3658794a536b976e83dc794eb67f3d4f2f111545514b0032598f04fe46487d15b564832c2a42825bd64157af876abb048800f0144d7c9575ccfa5995658242a435a9adf0a810f53ccc6ab1776d2f58760b37e4f35fe31c16576578778493e46cd94dd1e66a9a3d5e9c853f044eef04901d90f13ed34b7387507328cfeefede158d200906d9ea266b84046b9d30691c929ac441fd864211fa7d9810a0c55c850def67feae400467095e633a823ef7efd3c9aa1b8b7dea4e39ef9bf29ba901c7977a408b184d4a31d929343e8fd64d6b7f106a5b3605e92f7f1bb894731888bea31b1515bbe3e76e201a492018f41c23540e36aa999b04d1ed5bf363fbe8acf0d5baa31caafa9c48b48b4610d844e1d1f36267f6a8d29ba8ed3b16f656afc81dab17d177ef95f24cf2a7e176e3ee19e446e85a44f3b50d80273ea868d2d42ca5aaf9445d6b8a89ffdd5c6f59c519e62d6c28366a09e5081d4cd5b8e08df9791d64292ef322dd7f5aae2da39b061b0440fe26e2727a435c8f8d3346fadf357d7f77fa60fae7a6ba0eec68461057ffb623e2a951e867072d5553625bffbec90da5be08131727bb6f28075e20df75d8b0bd6ab6eb637b1c76d7d9e9fc87d87af130a2c5e5167e3b79e3cc3d88388426e4e50cdd40bc73c52221bbc8d7e0a5c1b743155392a683f273a01d0dcef63e0119eb7db9eaf78c835d662bea8617020186e4dcca523f2b5c1c5d124d2aa91e64cbcbcf751750951c92580b51e71cd12bbb15ff72332651efb258d7801e3bcbc12d7a3e7141a936262fb03b6479d3c99e6b19e55ceadfb717a5bd1fc867dcbf57eeec0677daa43d94de1e5fe8afc191a9f34063c4a281bd757d76a1284e06960c37c94c753f74446dddb2b33e31a2e14e9819f662aa0f9cbdc6b765cf8bf58249f0810877ea7547643c2fdae7c1db75da425a598b57429177fc6a22bd13d26ded2184b1f6ec07760bd7857f6cd7986409bd1c96b887d1ce1659d5735e2800d5c87e814d32b623eac9af0134406658278205fa722ce646965dec8da5c03475100ede4addda958f2cc6036d1db51d6ebc9b8726dbe5b7983791eb66c48f250856faf05aae87e5debd15aa564dad40c553202b634610002f9ee04e6c813f8f77f31e963a256acd6a2c3a1f3274901591535380d0955387fd8d1e954fca848592c7e5c2c0271c06847abce89219132c63c56c47c3a7aa93849edadd93aaa5f98706727ae7a3cbbb4b53591e6ab1b71fa5b65e2ae2e11eed2f0937b9d05a95b41490fa32df0250a79ec5a93deef50e375dcaaeef9a7b4dd555ffd164198b4a4087f55c07ae8390f5602799944840da9da1cce60a86aedfe90ee4f66586b22308deb36849bb43792a02152aa6e708ba5908355347f67bae2d9ec9a4d79c697a50bd57dda6e7a3c4144e4dc4b33ff001bff23e1eb39d52f1f1bc4a9cee0bcc3e9593476c58f1dcc64833b5ad68c450c016fd82472a921f949d641a36f97794d6e5c4ec3706374086cd74f5c1020a3459203438ab62ac8db810515c9fdb3c3f428754936c3ffd897f4b1481ea84c03a519c87934eca9e8a7a5c32e19719fae043bd4ac790371739befb29a13132e8e491c2cbb2c1877a59d7f10d3b06b2f5ead0f3eb66e3d9685422c8245638e7f535d3697db3fc13183bed305fb66a675db65ceaf7b4b89bf61255f113eadef0c4023b0cd131e89c6b732612b3d6a41036718ee133ae03b057fcee532e7bc2a819c4e4c5e92c4c813f1eed88c6bfdbe10bb693afdb5126d5506e6623740306d3b2832b56c6979a380072fa06a5c54a2fd5fd03d42cdf60a364933ef867c722226d78a3d6f99c0589efaa6497164a0f82dc2279c1ecc501c978c5d6b7882dc9382db8fa2e0d46f131796427cc64d1e14fa7ca68cf314316f5408623473d17600cf9f25db143ef1b931ae3411882a56c51494f5f59f38284a979256f5919488ced67a82009106bf3f47d283aee9a0af09db3287408b5e949fbade427421e485a382686ff61463fe7b46ebbdb1f5542eb88b279ba66306376bc3b354271aa1b9efd8171e3bfb063fc7c42a1a6da90edc8719a69fbc31244accf40362f72650cf40fc1ee91339792d8e69176e91d5c65359302ae78f956e35f2b8490c58c4d70fcc9d61aeef17a8941c1509d43bc2246671f5ffcc4b24b229f49bc90685b2e3f5a936fb09aa5a113eae652447c4cdd5e2da8d59180818a62e6c0cc68d466ad41f0f68b967b81f7400df84426f274812c0566a1a808b886eaecd9d53d79751a2985213fa98a5a0d4ff7b3473177df92d9066bd83787f0f9b0480d70e02c75ce300e30a10a665cdc3bac17c80dc3d473504103823d8de4f548712b3403f5aee45b0cfad20d48a841604cf58965f5789ebd239778690d54f5b37fe53eee06efa03fc7abc2031642fa7f2e1446b6917553423599ddc42e2d87419b14b6019cd07bc21fb1562b2cc775d3cc262818283cad6cbee9f991e17d9a7b6b403ab33e0d73954c2ac8d617f6ac52f7786771c02542b8d85a803305e5a6322437d3a68f57a601362b219b0996e434bf0abce3a21b31d34f9005fe92ce53a5c341e24098abc89f06466cb95769aed6e426dfbaf19b258822fcad1e4656d31d155e66ab4967788700b8e9ccffcf4f2023ed4bd0441e3b64585a1e437eb6396ef35c47852adfa7b4fb73e47c0d818cfe3a37b7d47843bfddb3eb521acb5322de0425dc9fc54b013d886fbc7c6c9b2be77aeb8f5bd05a80c5abb4c53adc79ec58568c7cadad3390ffca1c8ad51b5143104699c8800689940d9010fb215c09c57e28a73ab60faabddf2f9c41fece3e997a35183cf0ef37da6b5fd3d9ca34e1b1bfcf7a0b505a478408a4e570f9f327bc8130dafb15d393505f1dfea4833c4859220f32adaae36b40e0b559cb63f3b548a3af67d97a801f446f72d0951d5e1bdb90030041eb55082826e2117e96312a602b8b54b8cb5ef410fe3309f5e5b2ad4d0e0268b6a5463f0c2252f9169b10c0df14de65fca9676caddfa760b4ad7f4bf2ef69df7db32c725e95f7c80bb9e81fc9245445a0c3d2073ed45dd00564fe97e372bf06a08b3a2584afd43e82ce9bc39330d6494ccf14467807a32917c534f28618c04f2908d1eb8305e7ea5e4f94eac9e30b9dbef48c400c966ba35311c514028b1db67af4f5d5b9a33d311a627e39447295f1b5fd8a83fbffe3b2dacfe3c3860ba66a1c319fd392e76631e122737542fdb559df01c9f904a89f1d4f7d4de9db3b666fc9020574d3170ae002bbc636c8883756e93e1f36ad7679931ef9917bf7e4b76568764afce16420c8fcc1e4d3eea7b62c186a280275e710dca36013cca6cc6cc508f6d9d18a5d28fcdf0ddc5f00448669da77ca88f7e47cd32d1b80b6f3044cb20b8b000e6de40bc9fbbd44637fb2fa26c220cf5d46ae26fcc69e873cc48c653785386e9ba7451bca8a5cceac6ec7989ec0912760aea6ab825dc8246ee0a98e3cf495378cce79bf8df617948413a9050c206d270c50dc60062edc05ce58bc405223e8d433f4080a4f20619352123cc3d48bf337b4b26d8e904ce6b6a017499771917a498cc0836f9f2e466a0eab00f635c5ed8b1f993d9b2b6cbd9b5fcd998931068d3459f8cfc42af26acf91f922d52eefd08b9981632706025fc48cb5f130710df8e9dd16dd12bb91ec382bf62dfdf35657ad25674138f99231a39593be21c27d72b1ac0a1acc80d69788d04dd6a767dbdb8a2a31a85ccd7f1c5535810f773314bde30b68ac3e483721d1c959a36b252c8baa457de0b5a1e759d91ff383b23b121829f78428bfa593f8c8e8684fe01e03e32d7f99da4e10b03c091bba70304f4307d0338201a0c21d6e890483bf0e8ae65c02e56c76d9743a756287737d8982bf4ce086a247a46cbf16fbcff2ad02e016f6ef120852d90fb31ef876c5d1426360c619bb6387ab105ee8a94ad1ee93e341a5c1c19464ad86646339f0266b501f3e96d80e258128f97b00a86543d937472592cd41f06372183bb77fd11d17d85022e4a5453dbf954269809809fe4ae3e56f987be5dcf990ed8a74b0be369c971924f52b3f0cce73191b05a6e693481701c3466cb654aa371cfe2380630cb445706ae0505d413b885e8846531ebeb866607233f49181e2405c42c99cc8ae1008d49b77878ca99da9b262cb2dc8c6aab0cba63a1a9ede94046305a7c46eb5d415e814ddb5b8dcc2d62e1d8c9c0a5f40da0ac70e8fc717ffd5cddd9e247d09cf711a16e76a6fc9783fd5327fd9e13a6ea34ca38faa2634c8446b0a4753c05b58e5881985919757231c646b81ca663e5e7003f48726c7620f0909d9825689f35f2a87797932903b53f1a49df9e84c9a2c78708d66a328eb868756d681cf0122832c5b30f9c6c24afab39279ce0a920de0ec64435a9858b3cb4fe2281f21b05396bc7460b9243c684b99be34f4835bbf2dd25c07b015c57da8fadfd7b76574801d791d8ef7a0648519d52986cdb57a85e1e23540f67ad1c169428abd4dd2080fee2a73595c100a6f949dd2487af492f5ab045f2c489cefcde2973be30661c086e86c2d3e57e725b8ab14dafa8d7712455c3cf1c49f07e760388f564a73c21d1ad774eec7aa19f87455480deeae687e2075f59ea6c02de8507f19262f0b9ecc65eca9b664cc862e4ff46ed864d32fbb103c76e86c46042b71a533cda1759d85d76eadb40bc5baa9c902d127776387d94901ea11e47c5e9e0714c82c1a00805bca24ae38bc6ded45708ff2476dd150c1af24644351200ccf14240a66b17245cf6450434c2a5c15fcdf5fdbadcad169f29ee679fd19227bb9a016d2fd226de5a9c70f4d11f3e0bf3a46a5a275e07f1ca84eb7649fb05c3890", @generic="11e1069ed2925e310519e53bb79057abab0b5656d152f2d49a0cd541ed04ff812746f8382b2e8dc428545788a9be41fbb341"]}]}, 0x31cc}], 0x3, &(0x7f0000003e80)=[@rights={0x28, 0x1, 0x1, [r1, r0, r0, r1, r0, r1]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r1, r1, r0, r1, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0]}], 0xc8, 0x10}, 0x1) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:23 executing program 0 (fault-call:4 fault-nth:52): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 510.510681][ T4647] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 510.510689][ T4647] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 510.510697][ T4647] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9a, 0x0) [ 510.717901][ T4778] FAULT_INJECTION: forcing a failure. [ 510.717901][ T4778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 510.746991][ T4778] CPU: 0 PID: 4778 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 510.754947][ T4778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.765009][ T4778] Call Trace: [ 510.765039][ T4778] dump_stack+0x172/0x1f0 [ 510.765060][ T4778] should_fail.cold+0xa/0x15 [ 510.765078][ T4778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 510.765094][ T4778] ? ___might_sleep+0x163/0x280 [ 510.765116][ T4778] should_fail_alloc_page+0x50/0x60 [ 510.765129][ T4778] __alloc_pages_nodemask+0x1a1/0x7e0 [ 510.765143][ T4778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 510.765159][ T4778] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 510.765183][ T4778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.765208][ T4778] ? __kmalloc_node+0x3d/0x70 [ 510.765225][ T4778] ? rcu_read_lock_sched_held+0x110/0x130 [ 510.765240][ T4778] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 510.765257][ T4778] alloc_pages_current+0x107/0x210 [ 510.765278][ T4778] push_pipe+0x3fc/0x7a0 [ 510.772897][ T4778] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 510.772914][ T4778] ? debug_check_no_obj_freed+0x200/0x464 [ 510.772936][ T4778] ? iov_iter_revert+0xaa0/0xaa0 [ 510.772952][ T4778] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.772973][ T4778] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 510.793415][ T4778] ? iov_iter_pipe+0xba/0x2f0 [ 510.793440][ T4778] default_file_splice_read+0x199/0x890 [ 510.793456][ T4778] ? free_unref_page+0x476/0x600 [ 510.793466][ T4778] ? __put_page+0x8d/0xd0 [ 510.793484][ T4778] ? trace_hardirqs_on+0x67/0x230 [ 510.793499][ T4778] ? iter_file_splice_write+0xbe0/0xbe0 [ 510.793514][ T4778] ? __put_page+0x92/0xd0 [ 510.793540][ T4778] ? generic_pipe_buf_release+0x105/0x160 [ 510.804744][ T4778] ? direct_splice_actor+0x1a0/0x1a0 [ 510.804762][ T4778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 510.804777][ T4778] ? fsnotify+0x811/0xbc0 [ 510.804796][ T4778] ? fsnotify+0xbc0/0xbc0 [ 510.804811][ T4778] ? fsnotify_first_mark+0x210/0x210 [ 510.804825][ T4778] ? splice_shrink_spd+0xd0/0xd0 [ 510.804849][ T4778] ? security_file_permission+0x94/0x380 [ 510.804868][ T4778] ? iter_file_splice_write+0xbe0/0xbe0 [ 510.804888][ T4778] do_splice_to+0x12a/0x190 [ 510.816965][ T4778] splice_direct_to_actor+0x2d2/0x970 [ 510.816984][ T4778] ? generic_pipe_buf_nosteal+0x10/0x10 [ 510.817003][ T4778] ? do_splice_to+0x190/0x190 [ 510.817021][ T4778] ? rw_verify_area+0x118/0x360 [ 510.817036][ T4778] do_splice_direct+0x1da/0x2a0 [ 510.817051][ T4778] ? splice_direct_to_actor+0x970/0x970 [ 510.817074][ T4778] ? rw_verify_area+0x118/0x360 [ 510.817094][ T4778] do_sendfile+0x597/0xd00 [ 510.996232][ T4778] ? do_compat_pwritev64+0x1c0/0x1c0 [ 511.001509][ T4778] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 511.007743][ T4778] ? fput+0x1b/0x20 [ 511.011568][ T4778] __x64_sys_sendfile64+0x1dd/0x220 [ 511.016762][ T4778] ? __ia32_sys_sendfile+0x230/0x230 [ 511.022045][ T4778] ? do_syscall_64+0x26/0x610 [ 511.026750][ T4778] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.032030][ T4778] ? trace_hardirqs_on+0x67/0x230 [ 511.037059][ T4778] do_syscall_64+0x103/0x610 [ 511.041652][ T4778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.047569][ T4778] RIP: 0033:0x4582b9 17:31:24 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9b, 0x0) [ 511.051459][ T4778] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.071090][ T4778] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 511.079521][ T4778] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 511.087515][ T4778] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 511.095488][ T4778] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 511.103458][ T4778] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 511.111429][ T4778] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643df84feb281647eafaabf3e1bac96e7052c76694210db5fbfd8fc091ac1a94ac7dc8e3b763f2318876e87cd9842dd45438d45024770ce968b530205b08c9c96ef3764bb3b60c92bb70f70aba7fd53f7fda779609aac0cefc78f6af503e2b7b129599771e828b7b8bacdfeb98abb27ec2755fb23eef82e039d3ca2c06aa670f6634533112aa399dbeb61cca53f75900eaccd96a1d0652b920d36aa7fe6d1282bb7827130f9356a5184ddfb4f67665a9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:24 executing program 0 (fault-call:4 fault-nth:53): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c020000", @ANYRES16=r1, @ANYBLOB="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"], 0x22c}, 0x1, 0x0, 0x0, 0x4000014}, 0x800) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000400), 0x2) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9c, 0x0) [ 511.367765][ T4902] FAULT_INJECTION: forcing a failure. [ 511.367765][ T4902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 511.411590][ T4902] CPU: 0 PID: 4902 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 511.419522][ T4902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.429591][ T4902] Call Trace: [ 511.432903][ T4902] dump_stack+0x172/0x1f0 [ 511.437251][ T4902] should_fail.cold+0xa/0x15 [ 511.441882][ T4902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 511.447698][ T4902] ? ___might_sleep+0x163/0x280 [ 511.453067][ T4902] should_fail_alloc_page+0x50/0x60 17:31:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) 17:31:24 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72f8d7746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 511.458302][ T4902] __alloc_pages_nodemask+0x1a1/0x7e0 [ 511.463672][ T4902] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 511.463689][ T4902] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 511.463704][ T4902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.463725][ T4902] ? __kmalloc_node+0x3d/0x70 [ 511.463740][ T4902] ? rcu_read_lock_sched_held+0x110/0x130 [ 511.463761][ T4902] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 511.498143][ T4902] alloc_pages_current+0x107/0x210 [ 511.503301][ T4902] push_pipe+0x3fc/0x7a0 [ 511.507576][ T4902] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 511.513228][ T4902] ? debug_check_no_obj_freed+0x200/0x464 [ 511.518964][ T4902] ? iov_iter_revert+0xaa0/0xaa0 [ 511.518982][ T4902] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.518998][ T4902] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 511.519011][ T4902] ? iov_iter_pipe+0xba/0x2f0 [ 511.519031][ T4902] default_file_splice_read+0x199/0x890 [ 511.519048][ T4902] ? free_unref_page+0x476/0x600 [ 511.519058][ T4902] ? __put_page+0x8d/0xd0 [ 511.519076][ T4902] ? trace_hardirqs_on+0x67/0x230 17:31:24 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000100)=""/87, 0x57}], 0x1, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040)=0x3, 0x4) [ 511.519092][ T4902] ? iter_file_splice_write+0xbe0/0xbe0 [ 511.519109][ T4902] ? __put_page+0x92/0xd0 [ 511.519127][ T4902] ? generic_pipe_buf_release+0x105/0x160 [ 511.519149][ T4902] ? direct_splice_actor+0x1a0/0x1a0 [ 511.529417][ T4902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.529437][ T4902] ? fsnotify+0x811/0xbc0 [ 511.529457][ T4902] ? fsnotify+0xbc0/0xbc0 [ 511.529474][ T4902] ? fsnotify_first_mark+0x210/0x210 [ 511.529490][ T4902] ? splice_shrink_spd+0xd0/0xd0 [ 511.529515][ T4902] ? security_file_permission+0x94/0x380 [ 511.529534][ T4902] ? iter_file_splice_write+0xbe0/0xbe0 [ 511.529548][ T4902] do_splice_to+0x12a/0x190 [ 511.529566][ T4902] splice_direct_to_actor+0x2d2/0x970 [ 511.529584][ T4902] ? generic_pipe_buf_nosteal+0x10/0x10 [ 511.529603][ T4902] ? do_splice_to+0x190/0x190 [ 511.616834][ T4902] ? rw_verify_area+0x118/0x360 [ 511.616855][ T4902] do_splice_direct+0x1da/0x2a0 [ 511.616873][ T4902] ? splice_direct_to_actor+0x970/0x970 [ 511.616897][ T4902] ? rw_verify_area+0x118/0x360 [ 511.616914][ T4902] do_sendfile+0x597/0xd00 [ 511.616940][ T4902] ? do_compat_pwritev64+0x1c0/0x1c0 [ 511.616958][ T4902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 511.616982][ T4902] ? fput+0x1b/0x20 [ 511.626873][ T4902] __x64_sys_sendfile64+0x1dd/0x220 [ 511.626895][ T4902] ? __ia32_sys_sendfile+0x230/0x230 [ 511.626910][ T4902] ? do_syscall_64+0x26/0x610 [ 511.626926][ T4902] ? lockdep_hardirqs_on+0x418/0x5d0 [ 511.626943][ T4902] ? trace_hardirqs_on+0x67/0x230 [ 511.626961][ T4902] do_syscall_64+0x103/0x610 [ 511.626981][ T4902] entry_SYSCALL_64_after_hwframe+0x49/0xbe 17:31:24 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 511.626993][ T4902] RIP: 0033:0x4582b9 [ 511.627009][ T4902] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.627017][ T4902] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 511.627031][ T4902] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 511.627047][ T4902] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9d, 0x0) 17:31:24 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x20, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x20, 0x20, 0x4, 0x2}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={r2, 0x1}, &(0x7f00000003c0)=0x8) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000040)={0x5, 0xfffffffffffffffd}) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f00000001c0)={0x1, 0x0, [{}]}) [ 511.760762][ T4902] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 511.768740][ T4902] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 511.776716][ T4902] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:25 executing program 0 (fault-call:4 fault-nth:54): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:25 executing program 4: 17:31:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x5, 0x7, [0x267, 0x100000000, 0x1, 0x3, 0x5, 0xff, 0x7]}, &(0x7f0000000100)=0x16) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24, @remote}}, 0x851, 0x7fd}, 0x13c) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000140)={'sit0\x00', {0x2, 0x4e23, @broadcast}}) [ 511.929702][ T5138] FAULT_INJECTION: forcing a failure. [ 511.929702][ T5138] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:31:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9e, 0x0) 17:31:25 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 511.999974][ T5138] CPU: 0 PID: 5138 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 512.008204][ T5138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.018362][ T5138] Call Trace: [ 512.021669][ T5138] dump_stack+0x172/0x1f0 [ 512.026015][ T5138] should_fail.cold+0xa/0x15 [ 512.030619][ T5138] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.036441][ T5138] ? ___might_sleep+0x163/0x280 [ 512.041296][ T5138] should_fail_alloc_page+0x50/0x60 [ 512.046499][ T5138] __alloc_pages_nodemask+0x1a1/0x7e0 [ 512.051875][ T5138] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.058555][ T5138] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 512.058570][ T5138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.058589][ T5138] ? __kmalloc_node+0x3d/0x70 [ 512.058603][ T5138] ? rcu_read_lock_sched_held+0x110/0x130 [ 512.058616][ T5138] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 512.058632][ T5138] alloc_pages_current+0x107/0x210 [ 512.058650][ T5138] push_pipe+0x3fc/0x7a0 [ 512.058671][ T5138] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 512.058686][ T5138] ? debug_check_no_obj_freed+0x200/0x464 [ 512.058713][ T5138] ? iov_iter_revert+0xaa0/0xaa0 [ 512.087343][ T5138] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.102301][ T5138] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 512.102318][ T5138] ? iov_iter_pipe+0xba/0x2f0 [ 512.102337][ T5138] default_file_splice_read+0x199/0x890 [ 512.102353][ T5138] ? free_unref_page+0x476/0x600 [ 512.102364][ T5138] ? __put_page+0x8d/0xd0 [ 512.102381][ T5138] ? trace_hardirqs_on+0x67/0x230 [ 512.102396][ T5138] ? iter_file_splice_write+0xbe0/0xbe0 [ 512.102412][ T5138] ? __put_page+0x92/0xd0 [ 512.102431][ T5138] ? generic_pipe_buf_release+0x105/0x160 [ 512.102447][ T5138] ? direct_splice_actor+0x1a0/0x1a0 [ 512.102461][ T5138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.102483][ T5138] ? fsnotify+0x811/0xbc0 [ 512.113152][ T5138] ? fsnotify+0xbc0/0xbc0 [ 512.113179][ T5138] ? fsnotify_first_mark+0x210/0x210 [ 512.113203][ T5138] ? splice_shrink_spd+0xd0/0xd0 [ 512.113227][ T5138] ? security_file_permission+0x94/0x380 [ 512.113246][ T5138] ? iter_file_splice_write+0xbe0/0xbe0 [ 512.113261][ T5138] do_splice_to+0x12a/0x190 [ 512.113277][ T5138] splice_direct_to_actor+0x2d2/0x970 [ 512.113294][ T5138] ? generic_pipe_buf_nosteal+0x10/0x10 [ 512.113311][ T5138] ? do_splice_to+0x190/0x190 [ 512.113330][ T5138] ? rw_verify_area+0x118/0x360 [ 512.113348][ T5138] do_splice_direct+0x1da/0x2a0 [ 512.113368][ T5138] ? splice_direct_to_actor+0x970/0x970 [ 512.129033][ T5138] ? rw_verify_area+0x118/0x360 [ 512.143804][ T5138] do_sendfile+0x597/0xd00 17:31:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x9f, 0x0) [ 512.143832][ T5138] ? do_compat_pwritev64+0x1c0/0x1c0 [ 512.143849][ T5138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 512.143864][ T5138] ? fput+0x1b/0x20 [ 512.143883][ T5138] __x64_sys_sendfile64+0x1dd/0x220 [ 512.143901][ T5138] ? __ia32_sys_sendfile+0x230/0x230 [ 512.143915][ T5138] ? do_syscall_64+0x26/0x610 [ 512.143930][ T5138] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.143946][ T5138] ? trace_hardirqs_on+0x67/0x230 [ 512.143964][ T5138] do_syscall_64+0x103/0x610 [ 512.143983][ T5138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.144003][ T5138] RIP: 0033:0x4582b9 [ 512.305644][ T5138] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.325249][ T5138] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 512.333666][ T5138] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 512.333676][ T5138] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 17:31:25 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1, r1}, 0x14) open$dir(0x0, 0x0, 0x0) 17:31:25 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3ff, 0x2000) r1 = accept4$ax25(r0, &(0x7f0000000300)={{0x3, @default}, [@null, @netrom, @bcast, @default, @null, @default, @bcast, @netrom]}, &(0x7f0000000380)=0x48, 0x80800) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x4c, 0x0, [], {0x0, @bt={0x3, 0x6, 0x1, 0x3, 0x9, 0x5, 0xfff, 0x3, 0x7, 0xdb2, 0x8, 0x2, 0x8, 0x80, 0x1, 0xc}}}) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) getpid() r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r3, &(0x7f0000000100), 0x312, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}) 17:31:25 executing program 0 (fault-call:4 fault-nth:55): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 512.333684][ T5138] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 512.333692][ T5138] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 512.333700][ T5138] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa0, 0x0) 17:31:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = creat(&(0x7f0000000000)='./file0/../file0\x00', 0x48) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000040)={0x0, 0xff, "7130638fbe64b5a54633a696e23c1f25bafcfbf6cbecd275", {0x1}, 0x4}) [ 512.501423][ T5263] FAULT_INJECTION: forcing a failure. [ 512.501423][ T5263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 512.518552][ T5263] CPU: 1 PID: 5263 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 512.526464][ T5263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.536526][ T5263] Call Trace: [ 512.539835][ T5263] dump_stack+0x172/0x1f0 [ 512.544192][ T5263] should_fail.cold+0xa/0x15 [ 512.549886][ T5263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.555710][ T5263] ? ___might_sleep+0x163/0x280 [ 512.560584][ T5263] should_fail_alloc_page+0x50/0x60 [ 512.565793][ T5263] __alloc_pages_nodemask+0x1a1/0x7e0 [ 512.571190][ T5263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.577126][ T5263] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 512.582869][ T5263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.589095][ T5263] ? __kmalloc_node+0x3d/0x70 [ 512.593754][ T5263] ? rcu_read_lock_sched_held+0x110/0x130 [ 512.599461][ T5263] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 512.605735][ T5263] alloc_pages_current+0x107/0x210 [ 512.610854][ T5263] push_pipe+0x3fc/0x7a0 [ 512.615097][ T5263] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 512.620713][ T5263] ? debug_check_no_obj_freed+0x200/0x464 [ 512.626444][ T5263] ? iov_iter_revert+0xaa0/0xaa0 [ 512.631366][ T5263] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.636656][ T5263] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 512.642365][ T5263] ? iov_iter_pipe+0xba/0x2f0 [ 512.647060][ T5263] default_file_splice_read+0x199/0x890 [ 512.652608][ T5263] ? free_unref_page+0x476/0x600 [ 512.657743][ T5263] ? __put_page+0x8d/0xd0 [ 512.663415][ T5263] ? trace_hardirqs_on+0x67/0x230 [ 512.668442][ T5263] ? iter_file_splice_write+0xbe0/0xbe0 [ 512.673979][ T5263] ? __put_page+0x92/0xd0 [ 512.678297][ T5263] ? generic_pipe_buf_release+0x105/0x160 [ 512.684022][ T5263] ? direct_splice_actor+0x1a0/0x1a0 [ 512.689300][ T5263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.695530][ T5263] ? fsnotify+0x811/0xbc0 [ 512.699842][ T5263] ? fsnotify+0xbc0/0xbc0 [ 512.704238][ T5263] ? fsnotify_first_mark+0x210/0x210 [ 512.709518][ T5263] ? splice_shrink_spd+0xd0/0xd0 [ 512.714455][ T5263] ? security_file_permission+0x94/0x380 [ 512.720085][ T5263] ? iter_file_splice_write+0xbe0/0xbe0 [ 512.725612][ T5263] do_splice_to+0x12a/0x190 [ 512.730097][ T5263] splice_direct_to_actor+0x2d2/0x970 [ 512.735450][ T5263] ? generic_pipe_buf_nosteal+0x10/0x10 [ 512.740994][ T5263] ? do_splice_to+0x190/0x190 [ 512.745656][ T5263] ? rw_verify_area+0x118/0x360 [ 512.750521][ T5263] do_splice_direct+0x1da/0x2a0 [ 512.755354][ T5263] ? splice_direct_to_actor+0x970/0x970 [ 512.760887][ T5263] ? rw_verify_area+0x118/0x360 [ 512.765729][ T5263] do_sendfile+0x597/0xd00 [ 512.770139][ T5263] ? do_compat_pwritev64+0x1c0/0x1c0 [ 512.775428][ T5263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 512.781667][ T5263] ? fput+0x1b/0x20 [ 512.785485][ T5263] __x64_sys_sendfile64+0x1dd/0x220 [ 512.790713][ T5263] ? __ia32_sys_sendfile+0x230/0x230 [ 512.796012][ T5263] ? do_syscall_64+0x26/0x610 [ 512.800714][ T5263] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.806004][ T5263] ? trace_hardirqs_on+0x67/0x230 [ 512.811020][ T5263] do_syscall_64+0x103/0x610 [ 512.815605][ T5263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.821503][ T5263] RIP: 0033:0x4582b9 [ 512.825500][ T5263] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:26 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r1) r2 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80800) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000080)={0x8, 0x7, 0x3, 0xde0, 0x100000000}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/kcu\x00\b\x00\x94o\xe3AW\x9d\xc3\xfa\xce]?\x85\xd8\xb3\xa6py\xcf\xe9m[jFh\x8d\xe4Q\x87Y\xd87\xe9\\\x1a6\x9b\xab\x85\x1d\x9f\xd0\xa5\x8b9\xc3\x00'/67) preadv(r3, &(0x7f0000001400), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) [ 512.845468][ T5263] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 512.854030][ T5263] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 512.862089][ T5263] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 512.870078][ T5263] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 512.878070][ T5263] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 512.886057][ T5263] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:26 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:26 executing program 0 (fault-call:4 fault-nth:56): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa1, 0x0) 17:31:26 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:26 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) recvfrom$inet6(r0, &(0x7f0000000000)=""/27, 0x1b, 0x120, &(0x7f0000000040)={0xa, 0x4e23, 0x76d, @dev={0xfe, 0x80, [], 0x28}, 0x3}, 0x1c) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) signalfd(r0, &(0x7f0000000140)={0x5}, 0xfffffffffffffea9) [ 513.136383][ T5411] FAULT_INJECTION: forcing a failure. [ 513.136383][ T5411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 513.157130][ T5411] CPU: 0 PID: 5411 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 513.165076][ T5411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.175149][ T5411] Call Trace: [ 513.178484][ T5411] dump_stack+0x172/0x1f0 [ 513.182824][ T5411] should_fail.cold+0xa/0x15 [ 513.187519][ T5411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.193341][ T5411] ? ___might_sleep+0x163/0x280 [ 513.193365][ T5411] should_fail_alloc_page+0x50/0x60 [ 513.193380][ T5411] __alloc_pages_nodemask+0x1a1/0x7e0 [ 513.193395][ T5411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.193413][ T5411] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 513.193435][ T5411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.203491][ T5411] ? __kmalloc_node+0x3d/0x70 [ 513.203508][ T5411] ? rcu_read_lock_sched_held+0x110/0x130 [ 513.203523][ T5411] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 513.203540][ T5411] alloc_pages_current+0x107/0x210 [ 513.203559][ T5411] push_pipe+0x3fc/0x7a0 [ 513.203580][ T5411] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 513.203595][ T5411] ? debug_check_no_obj_freed+0x200/0x464 [ 513.203617][ T5411] ? iov_iter_revert+0xaa0/0xaa0 [ 513.220479][ T5411] ? lockdep_hardirqs_on+0x418/0x5d0 [ 513.275999][ T5411] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 513.281774][ T5411] ? iov_iter_pipe+0xba/0x2f0 [ 513.286667][ T5411] default_file_splice_read+0x199/0x890 [ 513.286687][ T5411] ? free_unref_page+0x476/0x600 [ 513.286697][ T5411] ? __put_page+0x8d/0xd0 [ 513.286715][ T5411] ? trace_hardirqs_on+0x67/0x230 [ 513.286729][ T5411] ? iter_file_splice_write+0xbe0/0xbe0 [ 513.286745][ T5411] ? __put_page+0x92/0xd0 [ 513.286763][ T5411] ? generic_pipe_buf_release+0x105/0x160 [ 513.286780][ T5411] ? direct_splice_actor+0x1a0/0x1a0 [ 513.286793][ T5411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:31:26 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 513.286807][ T5411] ? fsnotify+0x811/0xbc0 [ 513.286824][ T5411] ? fsnotify+0xbc0/0xbc0 [ 513.286840][ T5411] ? fsnotify_first_mark+0x210/0x210 [ 513.286861][ T5411] ? splice_shrink_spd+0xd0/0xd0 [ 513.312238][ T5411] ? security_file_permission+0x94/0x380 [ 513.312263][ T5411] ? iter_file_splice_write+0xbe0/0xbe0 [ 513.312282][ T5411] do_splice_to+0x12a/0x190 [ 513.368372][ T5411] splice_direct_to_actor+0x2d2/0x970 [ 513.373766][ T5411] ? generic_pipe_buf_nosteal+0x10/0x10 [ 513.379419][ T5411] ? do_splice_to+0x190/0x190 [ 513.384116][ T5411] ? rw_verify_area+0x118/0x360 [ 513.388987][ T5411] do_splice_direct+0x1da/0x2a0 [ 513.393862][ T5411] ? splice_direct_to_actor+0x970/0x970 [ 513.399431][ T5411] ? rw_verify_area+0x118/0x360 [ 513.404324][ T5411] do_sendfile+0x597/0xd00 [ 513.408865][ T5411] ? do_compat_pwritev64+0x1c0/0x1c0 [ 513.414267][ T5411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 513.420615][ T5411] ? fput+0x1b/0x20 [ 513.424542][ T5411] __x64_sys_sendfile64+0x1dd/0x220 [ 513.429760][ T5411] ? __ia32_sys_sendfile+0x230/0x230 17:31:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa2, 0x0) [ 513.435070][ T5411] ? do_syscall_64+0x26/0x610 [ 513.439768][ T5411] ? lockdep_hardirqs_on+0x418/0x5d0 [ 513.445080][ T5411] ? trace_hardirqs_on+0x67/0x230 [ 513.450128][ T5411] do_syscall_64+0x103/0x610 [ 513.454831][ T5411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.460820][ T5411] RIP: 0033:0x4582b9 [ 513.464729][ T5411] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) [ 513.484346][ T5411] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 513.492898][ T5411] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 513.501242][ T5411] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 513.501260][ T5411] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 513.517367][ T5411] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 513.525353][ T5411] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:26 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:26 executing program 1: r0 = getpid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000140)=0x10001, &(0x7f0000000180)=0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000000c0)={'ip6gre0\x00', 0xffff}) r3 = syz_open_procfs(r0, 0xffffffffffffffff) preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa3, 0x0) 17:31:26 executing program 0 (fault-call:4 fault-nth:57): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 513.762311][ T5519] FAULT_INJECTION: forcing a failure. [ 513.762311][ T5519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 513.790022][ T5519] CPU: 1 PID: 5519 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 513.798155][ T5519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.809289][ T5519] Call Trace: 17:31:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r1, 0x30, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8010) [ 513.812604][ T5519] dump_stack+0x172/0x1f0 [ 513.817144][ T5519] should_fail.cold+0xa/0x15 [ 513.821767][ T5519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.827587][ T5519] ? ___might_sleep+0x163/0x280 [ 513.832457][ T5519] should_fail_alloc_page+0x50/0x60 [ 513.837681][ T5519] __alloc_pages_nodemask+0x1a1/0x7e0 [ 513.843082][ T5519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.848900][ T5519] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 513.854612][ T5519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.860849][ T5519] ? __kmalloc_node+0x3d/0x70 [ 513.865540][ T5519] ? rcu_read_lock_sched_held+0x110/0x130 [ 513.871252][ T5519] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 513.877579][ T5519] alloc_pages_current+0x107/0x210 [ 513.882704][ T5519] push_pipe+0x3fc/0x7a0 [ 513.886965][ T5519] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 513.892601][ T5519] ? debug_check_no_obj_freed+0x200/0x464 [ 513.898320][ T5519] ? iov_iter_revert+0xaa0/0xaa0 [ 513.903274][ T5519] ? lockdep_hardirqs_on+0x418/0x5d0 [ 513.908564][ T5519] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 513.914285][ T5519] ? iov_iter_pipe+0xba/0x2f0 [ 513.918953][ T5519] default_file_splice_read+0x199/0x890 [ 513.924511][ T5519] ? free_unref_page+0x476/0x600 [ 513.929456][ T5519] ? __put_page+0x8d/0xd0 [ 513.933773][ T5519] ? trace_hardirqs_on+0x67/0x230 [ 513.938787][ T5519] ? iter_file_splice_write+0xbe0/0xbe0 [ 513.944323][ T5519] ? __put_page+0x92/0xd0 [ 513.948638][ T5519] ? generic_pipe_buf_release+0x105/0x160 [ 513.954362][ T5519] ? direct_splice_actor+0x1a0/0x1a0 [ 513.959640][ T5519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.965869][ T5519] ? fsnotify+0x811/0xbc0 [ 513.970194][ T5519] ? fsnotify+0xbc0/0xbc0 [ 513.974536][ T5519] ? fsnotify_first_mark+0x210/0x210 [ 513.979810][ T5519] ? splice_shrink_spd+0xd0/0xd0 [ 513.984739][ T5519] ? security_file_permission+0x94/0x380 [ 513.990366][ T5519] ? iter_file_splice_write+0xbe0/0xbe0 [ 513.995986][ T5519] do_splice_to+0x12a/0x190 [ 514.000483][ T5519] splice_direct_to_actor+0x2d2/0x970 [ 514.005862][ T5519] ? generic_pipe_buf_nosteal+0x10/0x10 [ 514.011397][ T5519] ? do_splice_to+0x190/0x190 [ 514.016084][ T5519] ? rw_verify_area+0x118/0x360 [ 514.020923][ T5519] do_splice_direct+0x1da/0x2a0 [ 514.025776][ T5519] ? splice_direct_to_actor+0x970/0x970 [ 514.031346][ T5519] ? rw_verify_area+0x118/0x360 [ 514.036201][ T5519] do_sendfile+0x597/0xd00 [ 514.040627][ T5519] ? do_compat_pwritev64+0x1c0/0x1c0 [ 514.045901][ T5519] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.052137][ T5519] ? fput+0x1b/0x20 [ 514.055949][ T5519] __x64_sys_sendfile64+0x1dd/0x220 [ 514.061135][ T5519] ? __ia32_sys_sendfile+0x230/0x230 [ 514.066436][ T5519] ? do_syscall_64+0x26/0x610 [ 514.071098][ T5519] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.076382][ T5519] ? trace_hardirqs_on+0x67/0x230 [ 514.081412][ T5519] do_syscall_64+0x103/0x610 [ 514.085996][ T5519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.091877][ T5519] RIP: 0033:0x4582b9 17:31:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:27 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa4, 0x0) 17:31:27 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x200, 0x0) write$P9_RREADDIR(r0, &(0x7f00000003c0)={0xc5, 0x29, 0x1, {0x79, [{{0x1, 0x3, 0x8}, 0x4c2, 0x1000, 0x7, './file0'}, {{0x8, 0x2, 0x4}, 0xc775, 0x1f, 0x7, './file0'}, {{0x8, 0x0, 0x7}, 0xffffffffffffffe0, 0x8c, 0x7, './file0'}, {{0x0, 0x0, 0x1}, 0x0, 0x7ed, 0x7, './file0'}, {{0x20}, 0x0, 0x0, 0x7, './file0'}, {{0x7, 0x3, 0x2}, 0x8, 0x1d88, 0x7, './file0'}]}}, 0xc5) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 514.095776][ T5519] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.115373][ T5519] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 514.123778][ T5519] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 514.131756][ T5519] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 514.139731][ T5519] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 514.147699][ T5519] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 514.155662][ T5519] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:27 executing program 0 (fault-call:4 fault-nth:58): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa5, 0x0) 17:31:27 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:27 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6d79, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x50, 0x180, 0x2, 0x0, 0x5, 0x200, 0x4, 0x6, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x9}, &(0x7f00000001c0)=0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fa43ffbffff3c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000003c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 514.395888][ T5662] FAULT_INJECTION: forcing a failure. [ 514.395888][ T5662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 514.414403][ T5662] CPU: 0 PID: 5662 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 514.422324][ T5662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.422333][ T5662] Call Trace: [ 514.422364][ T5662] dump_stack+0x172/0x1f0 [ 514.422389][ T5662] should_fail.cold+0xa/0x15 [ 514.422409][ T5662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.422429][ T5662] ? ___might_sleep+0x163/0x280 [ 514.422457][ T5662] should_fail_alloc_page+0x50/0x60 [ 514.422484][ T5662] __alloc_pages_nodemask+0x1a1/0x7e0 [ 514.467685][ T5662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.473527][ T5662] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 514.479256][ T5662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.479280][ T5662] ? __kmalloc_node+0x3d/0x70 [ 514.479297][ T5662] ? rcu_read_lock_sched_held+0x110/0x130 [ 514.479311][ T5662] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 514.479331][ T5662] alloc_pages_current+0x107/0x210 [ 514.507585][ T5662] push_pipe+0x3fc/0x7a0 [ 514.511858][ T5662] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 514.517515][ T5662] ? debug_check_no_obj_freed+0x200/0x464 [ 514.523257][ T5662] ? iov_iter_revert+0xaa0/0xaa0 [ 514.523276][ T5662] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.523291][ T5662] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 514.523303][ T5662] ? iov_iter_pipe+0xba/0x2f0 [ 514.523322][ T5662] default_file_splice_read+0x199/0x890 [ 514.523339][ T5662] ? free_unref_page+0x476/0x600 [ 514.523349][ T5662] ? __put_page+0x8d/0xd0 [ 514.523368][ T5662] ? trace_hardirqs_on+0x67/0x230 [ 514.523384][ T5662] ? iter_file_splice_write+0xbe0/0xbe0 [ 514.523401][ T5662] ? __put_page+0x92/0xd0 [ 514.523426][ T5662] ? generic_pipe_buf_release+0x105/0x160 [ 514.539732][ T5662] ? direct_splice_actor+0x1a0/0x1a0 [ 514.586318][ T5662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.592586][ T5662] ? fsnotify+0x811/0xbc0 [ 514.596935][ T5662] ? fsnotify+0xbc0/0xbc0 [ 514.601370][ T5662] ? fsnotify_first_mark+0x210/0x210 [ 514.601390][ T5662] ? splice_shrink_spd+0xd0/0xd0 [ 514.601417][ T5662] ? security_file_permission+0x94/0x380 [ 514.601438][ T5662] ? iter_file_splice_write+0xbe0/0xbe0 [ 514.601453][ T5662] do_splice_to+0x12a/0x190 [ 514.601471][ T5662] splice_direct_to_actor+0x2d2/0x970 [ 514.601488][ T5662] ? generic_pipe_buf_nosteal+0x10/0x10 [ 514.601506][ T5662] ? do_splice_to+0x190/0x190 17:31:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xfffffffffffeffff) preadv(r0, &(0x7f0000001400), 0x0, 0x800000000000) [ 514.601527][ T5662] ? rw_verify_area+0x118/0x360 [ 514.601543][ T5662] do_splice_direct+0x1da/0x2a0 [ 514.601560][ T5662] ? splice_direct_to_actor+0x970/0x970 [ 514.601584][ T5662] ? rw_verify_area+0x118/0x360 [ 514.601609][ T5662] do_sendfile+0x597/0xd00 [ 514.648396][ T5662] ? do_compat_pwritev64+0x1c0/0x1c0 [ 514.648418][ T5662] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.648434][ T5662] ? fput+0x1b/0x20 [ 514.648455][ T5662] __x64_sys_sendfile64+0x1dd/0x220 [ 514.648478][ T5662] ? __ia32_sys_sendfile+0x230/0x230 17:31:27 executing program 0 (fault-call:4 fault-nth:59): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 514.683577][ T5662] ? do_syscall_64+0x26/0x610 [ 514.683597][ T5662] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.683614][ T5662] ? trace_hardirqs_on+0x67/0x230 [ 514.683634][ T5662] do_syscall_64+0x103/0x610 [ 514.683653][ T5662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.683664][ T5662] RIP: 0033:0x4582b9 [ 514.683678][ T5662] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400), 0x3da7d962ab45cdd1, 0x4) getegid() readv(r0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000080)=""/146, 0x92}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x3) [ 514.683686][ T5662] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 514.683699][ T5662] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 514.683707][ T5662] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 514.683715][ T5662] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 514.683723][ T5662] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 514.683731][ T5662] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:28 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa6, 0x0) 17:31:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000040)='./file0\x00', 0x0) [ 514.935481][ T5859] FAULT_INJECTION: forcing a failure. [ 514.935481][ T5859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 514.962087][ T5859] CPU: 1 PID: 5859 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 514.970017][ T5859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.980199][ T5859] Call Trace: [ 514.983519][ T5859] dump_stack+0x172/0x1f0 [ 514.987867][ T5859] should_fail.cold+0xa/0x15 [ 514.992469][ T5859] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.998283][ T5859] ? ___might_sleep+0x163/0x280 [ 515.003135][ T5859] should_fail_alloc_page+0x50/0x60 [ 515.008331][ T5859] __alloc_pages_nodemask+0x1a1/0x7e0 [ 515.013689][ T5859] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.019488][ T5859] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 515.025201][ T5859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.031452][ T5859] ? __kmalloc_node+0x3d/0x70 [ 515.036116][ T5859] ? rcu_read_lock_sched_held+0x110/0x130 [ 515.041819][ T5859] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 515.048228][ T5859] alloc_pages_current+0x107/0x210 [ 515.053352][ T5859] push_pipe+0x3fc/0x7a0 [ 515.057586][ T5859] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 515.063211][ T5859] ? debug_check_no_obj_freed+0x200/0x464 [ 515.068927][ T5859] ? iov_iter_revert+0xaa0/0xaa0 [ 515.073861][ T5859] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.079135][ T5859] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 515.084871][ T5859] ? iov_iter_pipe+0xba/0x2f0 [ 515.089531][ T5859] default_file_splice_read+0x199/0x890 [ 515.095060][ T5859] ? free_unref_page+0x476/0x600 [ 515.099992][ T5859] ? __put_page+0x8d/0xd0 [ 515.104309][ T5859] ? trace_hardirqs_on+0x67/0x230 [ 515.109336][ T5859] ? iter_file_splice_write+0xbe0/0xbe0 [ 515.114866][ T5859] ? __put_page+0x92/0xd0 [ 515.119191][ T5859] ? generic_pipe_buf_release+0x105/0x160 [ 515.124925][ T5859] ? direct_splice_actor+0x1a0/0x1a0 [ 515.130204][ T5859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.136443][ T5859] ? fsnotify+0x811/0xbc0 [ 515.140760][ T5859] ? fsnotify+0xbc0/0xbc0 [ 515.145072][ T5859] ? fsnotify_first_mark+0x210/0x210 [ 515.150342][ T5859] ? splice_shrink_spd+0xd0/0xd0 [ 515.155269][ T5859] ? security_file_permission+0x94/0x380 [ 515.160886][ T5859] ? iter_file_splice_write+0xbe0/0xbe0 [ 515.166434][ T5859] do_splice_to+0x12a/0x190 [ 515.170944][ T5859] splice_direct_to_actor+0x2d2/0x970 [ 515.176301][ T5859] ? generic_pipe_buf_nosteal+0x10/0x10 [ 515.181829][ T5859] ? do_splice_to+0x190/0x190 [ 515.186509][ T5859] ? rw_verify_area+0x118/0x360 [ 515.191373][ T5859] do_splice_direct+0x1da/0x2a0 [ 515.196225][ T5859] ? splice_direct_to_actor+0x970/0x970 [ 515.201762][ T5859] ? rw_verify_area+0x118/0x360 [ 515.206596][ T5859] do_sendfile+0x597/0xd00 [ 515.211013][ T5859] ? do_compat_pwritev64+0x1c0/0x1c0 [ 515.216284][ T5859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.222529][ T5859] ? fput+0x1b/0x20 [ 515.226326][ T5859] __x64_sys_sendfile64+0x1dd/0x220 [ 515.231525][ T5859] ? __ia32_sys_sendfile+0x230/0x230 [ 515.236813][ T5859] ? do_syscall_64+0x26/0x610 [ 515.241481][ T5859] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.246751][ T5859] ? trace_hardirqs_on+0x67/0x230 [ 515.251769][ T5859] do_syscall_64+0x103/0x610 [ 515.256348][ T5859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.262233][ T5859] RIP: 0033:0x4582b9 [ 515.266111][ T5859] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:28 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/kcm\x00\b\x00') ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f00000000c0)={r2, 0x6}) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x8) [ 515.285804][ T5859] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 515.294219][ T5859] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 515.302183][ T5859] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 515.310140][ T5859] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 515.318119][ T5859] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 515.326073][ T5859] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:28 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="a4b3787b197c25e4", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5e23, 0x80000) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x810, r1, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000140)={0x17, 0x29, &(0x7f0000000040)="d1545795125e6359f851baa99cc359af2c2e37e4679a17972d761fa6eeae48504459b6c54fcb0451ed"}) 17:31:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa7, 0x0) 17:31:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:28 executing program 0 (fault-call:4 fault-nth:60): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:28 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa8, 0x0) 17:31:28 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000000)='nodev.\x00'}, 0x30) ptrace$peekuser(0x3, r1, 0x95) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 515.646622][ T6055] FAULT_INJECTION: forcing a failure. [ 515.646622][ T6055] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 515.661679][ T6055] CPU: 0 PID: 6055 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 515.669603][ T6055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.679666][ T6055] Call Trace: [ 515.679700][ T6055] dump_stack+0x172/0x1f0 [ 515.679724][ T6055] should_fail.cold+0xa/0x15 [ 515.679744][ T6055] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.679762][ T6055] ? ___might_sleep+0x163/0x280 [ 515.679786][ T6055] should_fail_alloc_page+0x50/0x60 [ 515.679799][ T6055] __alloc_pages_nodemask+0x1a1/0x7e0 [ 515.679814][ T6055] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.679830][ T6055] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 515.679843][ T6055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.679863][ T6055] ? __kmalloc_node+0x3d/0x70 [ 515.679886][ T6055] ? rcu_read_lock_sched_held+0x110/0x130 [ 515.692188][ T6055] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 515.692216][ T6055] alloc_pages_current+0x107/0x210 [ 515.692240][ T6055] push_pipe+0x3fc/0x7a0 [ 515.757941][ T6055] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 515.763586][ T6055] ? debug_check_no_obj_freed+0x200/0x464 [ 515.763609][ T6055] ? iov_iter_revert+0xaa0/0xaa0 [ 515.763626][ T6055] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.763642][ T6055] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 515.763655][ T6055] ? iov_iter_pipe+0xba/0x2f0 [ 515.763675][ T6055] default_file_splice_read+0x199/0x890 [ 515.763691][ T6055] ? free_unref_page+0x476/0x600 [ 515.763702][ T6055] ? __put_page+0x8d/0xd0 [ 515.763725][ T6055] ? trace_hardirqs_on+0x67/0x230 [ 515.774369][ T6055] ? iter_file_splice_write+0xbe0/0xbe0 [ 515.774387][ T6055] ? __put_page+0x92/0xd0 [ 515.774404][ T6055] ? generic_pipe_buf_release+0x105/0x160 [ 515.774421][ T6055] ? direct_splice_actor+0x1a0/0x1a0 [ 515.774434][ T6055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.774448][ T6055] ? fsnotify+0x811/0xbc0 [ 515.774468][ T6055] ? fsnotify+0xbc0/0xbc0 [ 515.774488][ T6055] ? fsnotify_first_mark+0x210/0x210 [ 515.851034][ T6055] ? splice_shrink_spd+0xd0/0xd0 [ 515.855994][ T6055] ? security_file_permission+0x94/0x380 [ 515.861639][ T6055] ? iter_file_splice_write+0xbe0/0xbe0 [ 515.861658][ T6055] do_splice_to+0x12a/0x190 [ 515.861677][ T6055] splice_direct_to_actor+0x2d2/0x970 [ 515.861698][ T6055] ? generic_pipe_buf_nosteal+0x10/0x10 [ 515.882629][ T6055] ? do_splice_to+0x190/0x190 [ 515.882652][ T6055] ? rw_verify_area+0x118/0x360 [ 515.882678][ T6055] do_splice_direct+0x1da/0x2a0 17:31:28 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xa9, 0x0) [ 515.897239][ T6055] ? splice_direct_to_actor+0x970/0x970 [ 515.902809][ T6055] ? rw_verify_area+0x118/0x360 [ 515.907675][ T6055] do_sendfile+0x597/0xd00 [ 515.912108][ T6055] ? do_compat_pwritev64+0x1c0/0x1c0 [ 515.917406][ T6055] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.923658][ T6055] ? fput+0x1b/0x20 [ 515.927484][ T6055] __x64_sys_sendfile64+0x1dd/0x220 [ 515.932699][ T6055] ? __ia32_sys_sendfile+0x230/0x230 [ 515.937998][ T6055] ? do_syscall_64+0x26/0x610 [ 515.942679][ T6055] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.947972][ T6055] ? trace_hardirqs_on+0x67/0x230 [ 515.953012][ T6055] do_syscall_64+0x103/0x610 [ 515.957615][ T6055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.963517][ T6055] RIP: 0033:0x4582b9 [ 515.967417][ T6055] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.987033][ T6055] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 17:31:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:29 executing program 0 (fault-call:4 fault-nth:61): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 515.987050][ T6055] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 515.987057][ T6055] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 515.987064][ T6055] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 515.987072][ T6055] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 515.987079][ T6055] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:29 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') openat$cgroup_int(r1, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:29 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xaa, 0x0) [ 516.161595][ T6113] FAULT_INJECTION: forcing a failure. [ 516.161595][ T6113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.188825][ T6113] CPU: 1 PID: 6113 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 516.196740][ T6113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.196757][ T6113] Call Trace: 17:31:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:29 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x10000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) [ 516.210096][ T6113] dump_stack+0x172/0x1f0 [ 516.210127][ T6113] should_fail.cold+0xa/0x15 [ 516.219018][ T6113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.219036][ T6113] ? ___might_sleep+0x163/0x280 [ 516.219061][ T6113] should_fail_alloc_page+0x50/0x60 [ 516.234884][ T6113] __alloc_pages_nodemask+0x1a1/0x7e0 [ 516.240273][ T6113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.246092][ T6113] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 516.251826][ T6113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.258083][ T6113] ? __kmalloc_node+0x3d/0x70 [ 516.262775][ T6113] ? rcu_read_lock_sched_held+0x110/0x130 [ 516.268487][ T6113] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 516.274717][ T6113] alloc_pages_current+0x107/0x210 [ 516.279809][ T6113] push_pipe+0x3fc/0x7a0 [ 516.284035][ T6113] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 516.289641][ T6113] ? debug_check_no_obj_freed+0x200/0x464 [ 516.295341][ T6113] ? iov_iter_revert+0xaa0/0xaa0 [ 516.300257][ T6113] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.305526][ T6113] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 516.311251][ T6113] ? iov_iter_pipe+0xba/0x2f0 [ 516.315922][ T6113] default_file_splice_read+0x199/0x890 [ 516.321457][ T6113] ? free_unref_page+0x476/0x600 [ 516.326371][ T6113] ? __put_page+0x8d/0xd0 [ 516.330680][ T6113] ? trace_hardirqs_on+0x67/0x230 [ 516.335690][ T6113] ? iter_file_splice_write+0xbe0/0xbe0 [ 516.341243][ T6113] ? __put_page+0x92/0xd0 [ 516.345559][ T6113] ? generic_pipe_buf_release+0x105/0x160 [ 516.351265][ T6113] ? direct_splice_actor+0x1a0/0x1a0 [ 516.356618][ T6113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.362836][ T6113] ? fsnotify+0x811/0xbc0 [ 516.367146][ T6113] ? fsnotify+0xbc0/0xbc0 [ 516.371473][ T6113] ? fsnotify_first_mark+0x210/0x210 [ 516.376759][ T6113] ? splice_shrink_spd+0xd0/0xd0 [ 516.381682][ T6113] ? security_file_permission+0x94/0x380 [ 516.387307][ T6113] ? iter_file_splice_write+0xbe0/0xbe0 [ 516.392843][ T6113] do_splice_to+0x12a/0x190 [ 516.397349][ T6113] splice_direct_to_actor+0x2d2/0x970 [ 516.409506][ T6113] ? generic_pipe_buf_nosteal+0x10/0x10 [ 516.415033][ T6113] ? do_splice_to+0x190/0x190 [ 516.419726][ T6113] ? rw_verify_area+0x118/0x360 [ 516.424581][ T6113] do_splice_direct+0x1da/0x2a0 [ 516.429414][ T6113] ? splice_direct_to_actor+0x970/0x970 [ 516.434943][ T6113] ? rw_verify_area+0x118/0x360 [ 516.439785][ T6113] do_sendfile+0x597/0xd00 [ 516.444196][ T6113] ? do_compat_pwritev64+0x1c0/0x1c0 [ 516.450252][ T6113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.456479][ T6113] ? fput+0x1b/0x20 [ 516.460276][ T6113] __x64_sys_sendfile64+0x1dd/0x220 [ 516.465455][ T6113] ? __ia32_sys_sendfile+0x230/0x230 [ 516.470721][ T6113] ? do_syscall_64+0x26/0x610 [ 516.475379][ T6113] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.480641][ T6113] ? trace_hardirqs_on+0x67/0x230 [ 516.485669][ T6113] do_syscall_64+0x103/0x610 [ 516.490272][ T6113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.496147][ T6113] RIP: 0033:0x4582b9 [ 516.500020][ T6113] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.519623][ T6113] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 516.528018][ T6113] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 516.536075][ T6113] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 516.544055][ T6113] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 516.552017][ T6113] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 516.559987][ T6113] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:29 executing program 0 (fault-call:4 fault-nth:62): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:29 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xab, 0x0) [ 516.757872][ T6203] FAULT_INJECTION: forcing a failure. [ 516.757872][ T6203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.783462][ T6203] CPU: 0 PID: 6203 Comm: syz-executor.0 Not tainted 5.1.0-rc3+ #51 [ 516.791385][ T6203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.801458][ T6203] Call Trace: [ 516.804763][ T6203] dump_stack+0x172/0x1f0 [ 516.809111][ T6203] should_fail.cold+0xa/0x15 [ 516.813712][ T6203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.819540][ T6203] ? ___might_sleep+0x163/0x280 [ 516.824412][ T6203] should_fail_alloc_page+0x50/0x60 [ 516.829621][ T6203] __alloc_pages_nodemask+0x1a1/0x7e0 [ 516.835007][ T6203] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 516.840733][ T6203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.846986][ T6203] ? __kmalloc_node+0x3d/0x70 [ 516.851670][ T6203] ? rcu_read_lock_sched_held+0x110/0x130 [ 516.857402][ T6203] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 516.863647][ T6203] alloc_pages_current+0x107/0x210 [ 516.868772][ T6203] push_pipe+0x3fc/0x7a0 [ 516.873039][ T6203] iov_iter_get_pages_alloc+0x8c2/0x1350 [ 516.878678][ T6203] ? debug_check_no_obj_freed+0x200/0x464 [ 516.884414][ T6203] ? iov_iter_revert+0xaa0/0xaa0 [ 516.889364][ T6203] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.894657][ T6203] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 516.900383][ T6203] ? iov_iter_pipe+0xba/0x2f0 17:31:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xac, 0x0) 17:31:30 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x501000, 0x40) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2d, 'cpu'}]}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xad, 0x0) [ 516.905093][ T6203] default_file_splice_read+0x199/0x890 [ 516.910675][ T6203] ? free_unref_page+0x476/0x600 [ 516.915616][ T6203] ? __put_page+0x8d/0xd0 [ 516.919958][ T6203] ? trace_hardirqs_on+0x67/0x230 [ 516.924992][ T6203] ? iter_file_splice_write+0xbe0/0xbe0 [ 516.930552][ T6203] ? __put_page+0x92/0xd0 [ 516.934899][ T6203] ? generic_pipe_buf_release+0x105/0x160 [ 516.940631][ T6203] ? direct_splice_actor+0x1a0/0x1a0 [ 516.945925][ T6203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.952171][ T6203] ? fsnotify+0x811/0xbc0 [ 516.956536][ T6203] ? fsnotify+0xbc0/0xbc0 [ 516.960865][ T6203] ? fsnotify_first_mark+0x210/0x210 [ 516.966136][ T6203] ? splice_shrink_spd+0xd0/0xd0 [ 516.971081][ T6203] ? security_file_permission+0x94/0x380 [ 516.976728][ T6203] ? iter_file_splice_write+0xbe0/0xbe0 [ 516.982272][ T6203] do_splice_to+0x12a/0x190 [ 516.986787][ T6203] splice_direct_to_actor+0x2d2/0x970 [ 516.992146][ T6203] ? generic_pipe_buf_nosteal+0x10/0x10 [ 516.997694][ T6203] ? do_splice_to+0x190/0x190 [ 517.002378][ T6203] ? rw_verify_area+0x118/0x360 [ 517.002398][ T6203] do_splice_direct+0x1da/0x2a0 [ 517.002417][ T6203] ? splice_direct_to_actor+0x970/0x970 [ 517.012108][ T6203] ? rw_verify_area+0x118/0x360 [ 517.012129][ T6203] do_sendfile+0x597/0xd00 [ 517.012156][ T6203] ? do_compat_pwritev64+0x1c0/0x1c0 [ 517.012188][ T6203] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 517.038491][ T6203] ? fput+0x1b/0x20 [ 517.042318][ T6203] __x64_sys_sendfile64+0x1dd/0x220 [ 517.047527][ T6203] ? __ia32_sys_sendfile+0x230/0x230 [ 517.052817][ T6203] ? do_syscall_64+0x26/0x610 [ 517.057507][ T6203] ? lockdep_hardirqs_on+0x418/0x5d0 [ 517.062803][ T6203] ? trace_hardirqs_on+0x67/0x230 [ 517.067843][ T6203] do_syscall_64+0x103/0x610 [ 517.072437][ T6203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.078318][ T6203] RIP: 0033:0x4582b9 [ 517.082223][ T6203] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:31:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xae, 0x0) 17:31:30 executing program 1: time(&(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:30 executing program 0 (fault-call:4 fault-nth:63): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 517.101839][ T6203] RSP: 002b:00007fa96c1a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 517.110261][ T6203] RAX: ffffffffffffffda RBX: 00007fa96c1a6c90 RCX: 00000000004582b9 [ 517.118324][ T6203] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 517.126301][ T6203] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 517.134277][ T6203] R10: 0000000080000001 R11: 0000000000000246 R12: 00007fa96c1a76d4 [ 517.142259][ T6203] R13: 00000000004c5227 R14: 00000000004d9368 R15: 0000000000000007 17:31:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000000c0)=0x3f) 17:31:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:31:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xaf, 0x0) 17:31:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:30 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 17:31:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb0, 0x0) 17:31:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:30 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3f) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x804) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f00000000c0)={0x4, 0x7fff, 0x4, 0x9, 0x2, 0x2}) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 17:31:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb1, 0x0) 17:31:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000002) 17:31:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:30 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746de2931394bc434e569f15022f6f64653d30303030303030303030303030303030303034303030302c75748c00fe375061", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$user(&(0x7f0000001500)='user\x00', &(0x7f0000001540)={'syz', 0x1}, &(0x7f0000001580)="291b422e77f6e91b5e38ec574d3fe14714a883b3d47f876152082546c58a2cbaa357c1a22775f80715858ef06ae6adceac861038db7e2e4a49aa9d3cf47a20e15c039de791a307b343374b461b1bfc241f76e22209d972f4802a7d84fd36fa4bdd709d9b88055e069517be09e2b379805a25c45f0f49c4c8f1f9db0d9c54a2", 0x7f, 0xfffffffffffffffb) r3 = accept$netrom(0xffffffffffffffff, &(0x7f0000000340)={{}, [@null, @netrom, @bcast, @remote, @default, @bcast, @rose, @default]}, &(0x7f0000001680)=0x48) sendmsg(r3, &(0x7f0000001d80)={&(0x7f00000016c0)=@nfc={0x27, 0x1, 0x0, 0x5}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001740)="8fcfa3da533220d94e1c2f587a29e92691cca832efde61428629fd3225f6cdfe6d344c4177c6ed97cd0f3bb087586e32e92c22733cdcf7b6e0bb6877592ea164f963480f0f25d251203077d45329f194894fffd0c031d3e49f637e5e71d8ceceb6923f2fae34d3e8dfeab502982d98f6358429157979dc737efa09d4c2a0e16b387307e768a293c197bc084841a38ad33a8224", 0x93}, {&(0x7f0000001800)="c67183ec9d9d8be2a198f6084137de10ce48134424fd7fed63912ebbec13f3", 0x1f}, {&(0x7f0000001840)="db8885dd441dd2222acaa3aec790c43aa0a2329aa90485897423cede182cda1bcae9c8e8", 0x24}, {&(0x7f0000001880)}, {&(0x7f00000018c0)="a87cecff6bc55bf8da3d10981f762ef0496a895f1a6a05bd46ee3e661d6d69c0b6daf318ddc07ccdac85110a25a67e55e2f8797f97c30c1f538efc19c7c241e1f5ee605656beef02ebd6f548137cb3379615a793c5c1070f387fd8c985c18ccdb7e993904f932b3933", 0x69}, {&(0x7f0000001940)="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", 0xfd}, {&(0x7f0000001a40)="6255fa8abcb4bd3b1b9326f06c3f990c902ca9", 0x13}], 0x7, &(0x7f0000001e80)=ANY=[@ANYBLOB="e000000000000000170100004ec70000876da95102000000000000008cffb9b9b364f6c42cfe66bfe9045ae775fd06000d44ee776e405ea928b8fd89ec4cd98e48b8e674661cfa0f36a732dd425f60fbad3c8fa96bb0001a39f49aa4e2de7562aaf12aa84cbc9bfd6ef59d29661f068a5181ec8bb31610d255ff31a4d770a896317d3cd505f1e0846dda8382d51f6c8bfda11d0a0bed7cc784f44e87f802a815e40ced60f345a15885e76a52d4c60fb670600ee58b04576121e7853d54bcbc626ad9b2c275c4416e15c60dcadf43ed918b7304e36a0002f4097f6adfa5ee252230000000000000001401000006000000d986aee0d5d2f0877a558617a6f9da7d9c0780cc15b065afcd9afc9800000000a00000000000000015010000fcffffff61addbd24784877027cf5220386346242631dec46740edc7b38854f52761c396ce614729b7cb3c36e597b3891b7343b4ef949d9482a3a7745e2e2555d64f4656e0f1e5d1e6dee0da2a9b337b956ddff8f043bca14289cc96ecf7e91365115a1a136ad74f19d35a1e46e923806e0df3f06f81120f7181e5e5992e7af21b3557a93baa54c3285840d55ec5b60000000000a0000000000000003a00000001000100c7b598935a2099bd2bfe646ca479bf45ee1b695eb8190530499e17c688952aed8996b6b15a8682de0385970b7d48e79ab1ef7868c560aa125c4a6fe924fa04c394f915a0f881644683f422413e66b25a89ed14a4dd7f91d184521c59482ad2589b83c38d98c6f99a80b8f95238a3bc0b6ccc93febeb4dfd1c3f5d28b757be981906adf912327a5b60980ab6d480000007d59126bb77b6ccfab16de16fdff69accfb927a89314b3f83ab6827fb87bb21b765d390277b312831155e0c4a5b07f5eed0d8c1f675ea1cea2979f65ca13cd77609b7c173919074a440af66c13f3feb470897eb2e08e0e512b03de680fe5f1f490c92a44524f0c05f893d5f344fbb9b3d76bd81b8de1ef8d2dff0378338ea855974cc57ce1ec895efbe2802436d4ef99b3134941fd5cecb6e2ff5ef28699b61448524ed97b355c52eb4835c97ee84711072f05f1405c7d09ef7f7a66ee99d82e2f9e5af7fce172fb0e305357e13ac37c672eb5d6affca5ab13d51ab556e322d305fb19804cdbe2590c889422be5580458f59e6ea83"], 0x250}, 0x854) keyctl$instantiate_iov(0x14, r1, &(0x7f0000001480)=[{&(0x7f0000000140)="b6cbcc14ec112e836b2b860eb683cd36461971acbc14f3ac220d05bda5ed15cc37fce937d36f22a4da18246f249b9c9e6712a01b4a4c53df113cc80b61ea623bc37dc2ef11ca53c8f6034913258aa1f7bad9926d632719967f8dea0c45a2f2fb9f92de76bdd1a084cf67248e8741d787e4ef6bc9cfc75850b4b0f43ad5a0e82e9f056512417c26a74e97d0295664ee7691c3a5979a2d8dafb70f1b7cfa947c5eab08d7f9624d05b272", 0xa9}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000002c0)="04136b4df129c7d83d7c98ddd0040f662941bb2c1d32af6cfe72cf99e020d03f9e6715a7ed8a261e5e259a0d4666f6f764e5fdb1a5e35fe3430aef835a142957a9fbc9a8cca96a52e964f3243314aced17946d120ddd5f59cc06428d34c41e3c98c2daf6f586", 0x66}, {&(0x7f0000000240)="0e6ab233d0f07ddc04", 0x9}, {&(0x7f00000013c0)="f18919c1deff8b1febc613549e2c64a232d1365ea49e9dd91a", 0x19}, {&(0x7f0000001400)="2d67785dac7cc2d9c3221caeb4c962c9651cfed47042294428412c5259e38ac62053739b755878970da46e386060a6be548ef32d175a8db8b7a9aa70fb144890774d33dffcc1", 0x46}], 0x6, r2) 17:31:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb2, 0x0) 17:31:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000003) 17:31:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)) 17:31:31 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:31 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74bc7664653d303030303030303030303030303030bf303034070000002c7573e5720569643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESOCT=r0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r1, &(0x7f0000000140)=@in6={0xa, 0x4e20, 0x9, @remote, 0x80000000}, 0x80) 17:31:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb3, 0x0) 17:31:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000004) 17:31:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb4, 0x0) 17:31:31 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:31 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{&(0x7f0000001880)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001900)=""/1, 0x1}, {&(0x7f0000001940)=""/149, 0x95}, {&(0x7f0000001a00)=""/151, 0x97}, {&(0x7f0000001ac0)=""/168, 0xa8}, {&(0x7f0000001b80)=""/181, 0xb5}], 0x5, &(0x7f0000001cc0)=""/11, 0xb}, 0x71a}], 0x1, 0x0, &(0x7f0000001d40)={0x0, 0x989680}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000001d80)={{0x80000001, 0x56, 0x2db, 0x6, 0x7fffffff, 0x1}, 0x80000001, 0x5, 0x6}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c5a726f75705f69643d6d2e3ea53f941c7be399256be0614a5087fd6ce499d27f6b88d7e2f36133406b029e319257315b0c3c292091cfd0c663abbfb5e7db03d7bf530d0851b297be89fadda59e0ad73f722b5230a68c4900c2a794392a10d6fdef72ef36a8fc9d7ae125aea2f26eb3841f33bbee5cd1b2767c398baf57566f9ac03ada37f6ea29820ca0710b4d34ff791fbe3101fc956151a6656b932c83e0395c0353487c7041f9da7160bd591c21c9593aa2721ab7d6d70367135ac68b27d775be36e9b66a8766449a8db6d4d502b5fdddbadff3a6ba7371308fa90774568d49af96661c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000005) 17:31:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') getsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = semget$private(0x0, 0x5, 0x400) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f0000000140)=""/33) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:31 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb5, 0x0) 17:31:32 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x800, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f00000001c0)=0x8000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xffffffffffffffff, 0x3}, 0x10) r2 = accept4(r0, &(0x7f0000000200)=@ax25={{}, [@default, @remote, @default, @remote, @remote, @remote, @netrom, @bcast]}, &(0x7f00000002c0)=0x80, 0x800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r3, 0xa, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x330c2a63}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffa57}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:31:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x7ff, 0x40000) dup3(r0, r1, 0x80000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000140)) 17:31:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000006) 17:31:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb6, 0x0) 17:31:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000007) 17:31:32 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x82) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303ec3896e07afe78b94b6303030303030303030303030303034303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c62c9156ba55c1c0a928ef4aa64da00"]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f0000000240)=""/253, &(0x7f0000000040)=0xfd) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000180)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x4000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000800), &(0x7f0000000780), &(0x7f00000007c0)=0x0) r4 = geteuid() ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f00000006c0)={0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}]}) setresuid(r2, r3, r4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000700)={[], 0x2, 0x8001, 0x81, 0x1, 0x400, r5}) 17:31:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb7, 0x0) 17:31:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000008) 17:31:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') sendmsg$nl_crypto(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="e80000001300080828bd7000fbdbdf257368613235362d6e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000704b77d670a7eb68000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000020000000000000000000000800010006000000"], 0xe8}, 0x1, 0x0, 0x0, 0x40080}, 0x48840) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000300)='net/kcm\x00\b\x00', 0xffffffffffffffff}, 0x30) ptrace(0xffffffffffffffff, r2) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r3, 0xffffffffffffffb9, &(0x7f0000000080)) connect$caif(r0, &(0x7f00000002c0), 0x18) open(&(0x7f0000000280)='./file0\x00', 0x200, 0x10) 17:31:32 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00643d00000100000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb8, 0x0) 17:31:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000009) 17:31:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xb9, 0x0) 17:31:33 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x1ffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0xffffffffffffffda, 0x5}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="66643d664455b1dc5505e9c9ef189538cab03caf5c0d9b210ddf490cc11d93ef1e5a377a3ce8db184c48ed9e35e26ad1f92e3d74bab407a7a1378a770660103c452ab0af20c39c2a96e8fb1aac51182f1a50eb30159f2b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x84000) getsockname$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0x3d}, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:33 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xba, 0x0) 17:31:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000000a) 17:31:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) connect$packet(r0, &(0x7f0000000300)={0x11, 0xf5, r1, 0x1, 0x6}, 0x14) poll(&(0x7f0000000100)=[{r0, 0x2100}, {r0, 0x4000}], 0x2, 0x6) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) 17:31:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:33 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:33 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbb, 0x0) 17:31:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000000b) 17:31:33 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:33 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x40, 0x101000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a00000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x3df27ab0b7aefc6, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f74020000499fe2f93030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) accept4$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000400)=0x1c, 0x800) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000300)={0x57, 0x727b, 0x2, {0x70, 0xffffffffffffffc0}, {0x5, 0xd9}, @period={0x0, 0x1f, 0x9, 0x5ed7, 0x2, {0x1, 0x5, 0x2037, 0x2}, 0x2, &(0x7f0000000000)=[0x519b, 0x401]}}) 17:31:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000000c0)={0xd0ab, 0x5, 0x10001}) 17:31:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbc, 0x0) 17:31:33 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000000c) 17:31:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:33 executing program 2: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, &(0x7f0000000140), 0x80000, &(0x7f0000000180)='\xc5user!*mime_type\x00') stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') renameat2(r1, &(0x7f00000005c0)='./file0\x00', r1, &(0x7f0000000600)='./file0/file0\x00', 0x3) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x68, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x749}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4048800}, 0x4040000) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='affs\x00', 0x4000, &(0x7f00000002c0)='/dev/fuse\x00') 17:31:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbd, 0x0) 17:31:33 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000000d) 17:31:33 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x120) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) getpeername(r0, &(0x7f0000000100)=@ipx, &(0x7f0000000180)=0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') fsetxattr$trusted_overlay_upper(r1, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x41, 0x4, 0xf9, "87e96b901a0b45dc51e215b0b96c966f", "0447de2c2ebdcf6c52c594d9218cafdbd5f8daf2e60c0a5e728742178d34b7ca69a13cc19c9151608daf26b6"}, 0x41, 0x1) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbe, 0x0) 17:31:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:34 executing program 2: setrlimit(0x7, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 17:31:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000000e) 17:31:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xbf, 0x0) 17:31:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') sysfs$3(0x3) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000000c0)={0x105004, 0x2, 0x7, 0x2}) clock_settime(0x6, &(0x7f0000000100)={0x77359400}) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 17:31:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000000f) 17:31:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc0, 0x0) 17:31:34 executing program 2: accept(0xffffffffffffff9c, 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udplite6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 17:31:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000200)={0xa, [0x7fff, 0x0, 0x6, 0x20, 0x5, 0x1, 0x6, 0x2, 0x1, 0x9]}, 0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="6d000000396145e16ea004fefa10ab045a0efc5fb84adad4d42ff0f3d9c52224f454cd4345fe805fc0a268839bca5826bf3051133f7a060238e73c1b3a8deb905bc654f1546d9243d98ab839536ed0b92b2d8733c2e90b953fd6fb46a3ecec24853eb2c9f556f43d76643dbdea00000000"], &(0x7f0000000140)=0x75) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x80000001, 0x30}, &(0x7f00000001c0)=0xc) 17:31:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc1, 0x0) 17:31:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000010) 17:31:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc2, 0x0) 17:31:34 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x802, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0x5, 0x1, 0x2, 0xfffffffffffffffa, 0x1, 0x2c, 0xff, 0x40]}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000500) 17:31:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:35 executing program 2: socket(0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x51) r0 = gettid() setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) inotify_init1(0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) tkill(r0, 0x1000000000016) 17:31:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc3, 0x0) 17:31:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000600) 17:31:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:35 executing program 1: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc4, 0x0) 17:31:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffef4, &(0x7f0000000140)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc5, 0x0) 17:31:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000cc8) 17:31:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f00000000c0)) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(r1, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) 17:31:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/softnet_stat\x00') pipe(&(0x7f0000000040)) preadv(r0, &(0x7f0000001400), 0x0, 0xffffffffffffffff) 17:31:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc6, 0x0) 17:31:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc7, 0x0) 17:31:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000cd1) 17:31:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:36 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc8, 0x0) 17:31:36 executing program 1: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/kcm\x00\b\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/87, 0x57}], 0x0, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000000)=0xfffffffffffffffc) keyctl$join(0x1, 0x0) 17:31:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000cda) 17:31:36 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:36 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:36 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xc9, 0x0) 17:31:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ce3) 17:31:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffef4, &(0x7f0000000140)=0x40000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r0, r0, 0x7}) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:36 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:36 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xca, 0x0) 17:31:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ce9) 17:31:37 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='net/fib_triestat\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x7fff, 0x0, 0x80, 0x6e98}, &(0x7f0000000280)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x2}}, 0x10) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000400)={0x2, 0x0, @dev}, &(0x7f0000000440)=0x10) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000480)={'veth1\x00', {0x2, 0x20000004e25, @dev={0xac, 0x14, 0x14, 0x24}}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f0000000100)='loselinuxppp0wlan0\x00', r0}, 0x30) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/fib_triestat\x00') preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000004c0)=0x3, 0x4) 17:31:37 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcb, 0x0) 17:31:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffef4, &(0x7f0000000140)=0x40000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:37 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcc, 0x0) 17:31:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000cf2) 17:31:37 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r1 = socket$inet6(0xa, 0x200004000000001, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @multicast1}}) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000000)=0x40) setsockopt$inet_buf(r1, 0x0, 0x100000040, &(0x7f0000000040), 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='westwood\x00', 0x9) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/72, 0x48}, {&(0x7f0000000140)=""/164, 0xa4}, {&(0x7f0000000200)=""/225, 0xe1}, {&(0x7f0000000300)=""/107, 0x6b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/44, 0x2c}, {&(0x7f0000000400)=""/133, 0x85}], 0x7, 0x0) 17:31:37 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcd, 0x0) 17:31:37 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000cfb) 17:31:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x2ad, &(0x7f00000000c0)=0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 17:31:38 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:38 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xce, 0x0) 17:31:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000000c0)=""/120) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x3a0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000580)={0x6, 0x0, [{0x107000, 0x23, &(0x7f0000000140)=""/35}, {0xd004, 0xa2, &(0x7f0000000180)=""/162}, {0x0, 0xba, &(0x7f0000000240)=""/186}, {0xf7d02205f0fcfa93, 0x87, &(0x7f0000000300)=""/135}, {0x2001, 0xdc, &(0x7f00000003c0)=""/220}, {0x0, 0xba, &(0x7f00000004c0)=""/186}]}) 17:31:38 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xcf, 0x0) 17:31:38 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d04) 17:31:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x2ad, &(0x7f00000000c0)=0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 17:31:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) 17:31:38 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) 17:31:38 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d0f) 17:31:38 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd1, 0x0) 17:31:38 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)={0x0, @aes128, 0x0, "97a2dedb6a9b5fdb"}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x2ad, &(0x7f00000000c0)=0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 17:31:39 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:39 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd2, 0x0) 17:31:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d13) 17:31:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x40, &(0x7f0000000040)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1, 0xffff}, &(0x7f0000000140)=0x8) preadv(r0, &(0x7f00000000c0), 0x0, 0x2f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x62e3241a) 17:31:39 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:39 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd3, 0x0) 17:31:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d24) 17:31:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x7, 0x5, [0x3, 0x1e, 0xb42a, 0x1, 0xfff]}, &(0x7f0000000280)=0x12) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x1f, 0xd4f, 0x208, 0x5, 0x2, 0x2, 0x3ab, 0x200, r1}, &(0x7f0000000300)=0x20) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e23, @multicast1}, 0x1, 0x0, 0x0, 0x0, 0x81, &(0x7f00000000c0)='nr0\x00', 0x4, 0x400, 0x4}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x25}}, {0x2, 0x8, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x4746, &(0x7f0000000180)='netdevsim0\x00\x00\x02\x00', 0x0, 0x48e087e5, 0x7}) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/87, 0xe1}], 0x1e3, 0x0) 17:31:39 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd4, 0x0) 17:31:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:39 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d2d) 17:31:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:39 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd5, 0x0) 17:31:39 executing program 1: socket(0x3, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0xc, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x400000000011) r0 = getpgid(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, r0, 0x19, &(0x7f00000006c0)={0x0, 0x0, 0xcb94}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000200)={0x0, 0x4, 0xbe81, 0x3}) fchdir(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x10000000003, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070a07121dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 17:31:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd6, 0x0) 17:31:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d36) 17:31:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) [ 526.868206][ T9226] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 17:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd7, 0x0) 17:31:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000000c0)=0x1000, &(0x7f0000000100)=0x4) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000140)={0x400, 0x34324d59, 0x0, @stepwise={0x40, 0x1000, 0x32e, 0x6, 0x0, 0x5}}) 17:31:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd8, 0x0) 17:31:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d3f) 17:31:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xd9, 0x0) 17:31:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d45) 17:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:40 executing program 1: syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x990f, 0x4000) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xda, 0x0) 17:31:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d4e) 17:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdb, 0x0) 17:31:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:40 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d57) 17:31:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x0, 0x0, 0x4, [], &(0x7f0000000100)={0x9909ce, 0xffff, [], @p_u8=&(0x7f00000000c0)=0x93}}) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000180)=0x81) 17:31:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:41 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdc, 0x0) 17:31:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:41 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d60) 17:31:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:41 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdd, 0x0) 17:31:41 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:41 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x40000) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'ip_vti0\x00'}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000000c0)=0x55) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) process_vm_readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/223, 0xdf}, {&(0x7f0000000240)=""/100, 0x64}], 0x2, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/228, 0xe4}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/139, 0x8b}, {&(0x7f00000014c0)=""/247, 0xf7}, {&(0x7f00000015c0)=""/96, 0x60}, {&(0x7f0000001640)=""/124, 0x7c}], 0x6, 0x0) recvmmsg(r0, &(0x7f0000000100), 0x0, 0x10000, 0x0) 17:31:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d6b) 17:31:41 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xde, 0x0) 17:31:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d6f) 17:31:41 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8000, 0x0) ioctl$TIOCEXCL(r0, 0x540c) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/44, 0x2c}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f0000000300)=""/82, 0x52}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f00000003c0)=""/154, 0x9a}], 0x6, &(0x7f0000000500)=""/160, 0xa0}, 0x1}], 0x1, 0x40, &(0x7f0000000600)) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000640)={0xffffffff, 0xa3, 0x5, 0x9}, 0x8) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x54) mknodat(r2, &(0x7f0000000240)='./file0\x00', 0xa000, 0xfffffdaf) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dsp\x00', 0x244, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000140)={0x0, r3}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r4, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:41 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xdf, 0x0) 17:31:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d80) 17:31:41 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:41 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe0, 0x0) 17:31:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d89) 17:31:42 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) r1 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r2, 0x4) r3 = syz_open_procfs(r0, &(0x7f0000000200)='net/wireless\x00') preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:42 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:42 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe1, 0x0) 17:31:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:42 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe2, 0x0) 17:31:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d92) 17:31:42 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:42 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0xe7b6, 0x169a41) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0xffffffff, &(0x7f00000001c0)=0x4) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000100)="768a767a25de4a967903d4696602b275fbc722c5eb4107e0ae1c9569ac869186b7eed2895c1bb6a8bf3c78e301e4fb31156a44ead3bfd8eb3f12e1529fbd33ff0a932539ee12473189bdb7cb720f987e8b8c9e0d2fcf7fb858869e5a0a46a810126029e336886d572444") 17:31:42 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe3, 0x0) 17:31:42 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000d9b) 17:31:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:42 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) 17:31:42 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x77359400}}, 0x100) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000da1) 17:31:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:42 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe5, 0x0) 17:31:42 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000daa) 17:31:43 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x404000, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) r2 = add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="9014ad690e77038b6195b1b3847635e93bc1ed46c09414f3d0f251c03df19c944456458ed2abf8c5b23e7ebdee062152c1456273c7acccccf9b5c30c8f1b9fa30ffacc8bd4540f70ad56388b344f27f97206d681f1c604493d17232c8a3bb451799da9ca95bb30002967a54947c52a47f610323c9833657a3cd4746848f599955d3a40bdc87cd42b63fe7e714b05ac51", 0x90, 0xfffffffffffffff8) keyctl$revoke(0x3, r2) 17:31:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:43 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:43 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe6, 0x0) 17:31:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000db3) 17:31:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:43 executing program 1: memfd_create(&(0x7f00000000c0)='net/kcm\x00\b\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x10000000, 0x100000000, 0x30}) 17:31:43 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe7, 0x0) 17:31:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000dbc) 17:31:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:43 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe8, 0x0) 17:31:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000000100), 0x0, 0x20000000000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000100)={r0, r0}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x5, 0x8, 0xfffffffffffffffa, 0x6, 0x4, r1}) 17:31:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000dc7) 17:31:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:44 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xe9, 0x0) 17:31:44 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000dcb) 17:31:44 executing program 1: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000100)=""/76, &(0x7f0000000180)=0x4c) r2 = syz_open_procfs(r0, &(0x7f0000000000)='net/kcm\x00\b\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x200002, 0x0) preadv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:44 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xea, 0x0) 17:31:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ddc) 17:31:44 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:44 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xeb, 0x0) 17:31:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000000c0)={0x0, r0}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x40000, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:44 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:44 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xec, 0x0) 17:31:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000de5) 17:31:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x3, 0x9, 0x6, 0x400], 0x4, 0x101, 0x6, 0xbe, 0x4, 0x0, {0x5, 0x80, 0x5c42b083, 0x9, 0xff, 0x101, 0xffffffffffff99aa, 0x40, 0x7, 0xfff, 0x5, 0x3, 0x24, 0x6, "fb68c8fdf2ec801e3d87ff0e94d37f102f75be73248329aabd8a7d07f2ef12b4"}}) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0), 0x4) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x4, @dev={[], 0x14}, 'bpq0\x00'}}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) syz_mount_image$ceph(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000300)='./file0\x00', 0x975, 0x7, &(0x7f0000000600)=[{&(0x7f0000000340)="ddf20737fe462b2823757f24c65d81812e4ef94f742cc5fe03884f85c3b18aaf042c3e80d6978dbe9fd2e81d5a40c8fd33c7f29f5d1464953969bd85d06eacbce666e87d5d8b86e6596880b58db760531981337f266edf20a13644e2e02d717a4eee4c6623b25a66e07d4e60287105d07c119eb9967b058c5a846ce8e0f13411f162ca2317b6438fd31a4614fe4d12fc8dc227f469184507730f8cce1918a56f7837e4c6d607587d38c54626918f1779522282d86e8f94c4158223e0f642eadf", 0xc0, 0x5}, {&(0x7f0000000400)="db37525262e072f357f97e8b09a3f4d0a26510e753ae720c", 0x18, 0x3}, {&(0x7f0000000440)="91d2f46f491bdcdb96130e248ecdca016f09986c", 0x14, 0x3}, {&(0x7f0000000480)="4338c4453fe44987316b62775a59acbd85faa4fb4bedb8e79e9001114830436de76fef8925d9253e0cd19f1c03f722c50c9429333f4802dd408d7288e028de71bfc7ca", 0x43, 0x80000001}, {&(0x7f0000000500)="3b14128ecd3d35357fd87a74b72b93f8f7c283c22e410ecb87c89dda6bcaf543298c5470099b9cfdd01ff0b6ca7214ec5130647a26d41dc1f174b0816480af319e5929ae6914047d9178d63c", 0x4c, 0xff}, {&(0x7f0000000580)="0df203a17945b6aa4f1899158fe85143df3ff631e7b4c6e5af39de9ab50456375c0fc52b190b00fcd537dd21880e7f103e74f394f25e96708f8a8c9c9474f987c156b02612d72ad684aff9a7dcf4d83d05a465", 0x53, 0x3}, {&(0x7f0000001440)="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", 0x1000, 0x1}], 0x2001, &(0x7f00000006c0)='\x00') openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mISDNtimer\x00', 0x80, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000180)=0xf4254) 17:31:45 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xed, 0x0) 17:31:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000dee) 17:31:45 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xee, 0x0) 17:31:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x60fc) ftruncate(r2, 0x48207) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sysinfo(&(0x7f0000001440)=""/4096) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4000008}) sendfile(r2, r3, 0x0, 0x80000000000400) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000df7) 17:31:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(0x0, 0x0) 17:31:45 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',grou', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xef, 0x0) 17:31:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) [ 532.635680][ T26] audit: type=1804 audit(1554399105.798:41): pid=11156 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir786556943/syzkaller.chTy99/825/bus" dev="sda1" ino=17346 res=1 17:31:45 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000dfd) 17:31:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(0x0, 0x0) 17:31:45 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf0, 0x0) 17:31:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @multicast2}, {0x307, @broadcast}, 0x28, {0x2, 0x4e21, @remote}, 'ip_vti0\x00'}) 17:31:46 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(0x0, 0x0) 17:31:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e06) 17:31:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf1, 0x0) 17:31:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:46 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_i', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\xff\xff\xff\xff\b\x00') recvmsg$kcm(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/154, 0x9a}, {&(0x7f00000001c0)=""/167, 0xa7}], 0x2, &(0x7f0000001300)=""/4096, 0x1000}, 0x101) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) 17:31:46 executing program 4: 17:31:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e0f) 17:31:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:46 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:46 executing program 4: 17:31:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf3, 0x0) 17:31:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:46 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e18) 17:31:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x200, 0x0) 17:31:46 executing program 4: 17:31:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf4, 0x0) 17:31:46 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:46 executing program 4: 17:31:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e23) 17:31:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='K\x8c.\xf8kcm\x00\b\x00\rj&i\x04\xf1U\xb5)s\xda\xca\xf5\x11.\xc0\'`\xe1F\xa9\xc5_\x9e\xef\x8b\x8f\xc7\xd2\x9a}\xd2G4\x88\\\xe7\x8d|=\xcf\x1cv\xcd\xd4\x18\x80\xb4\xb7\x91\xdb\xe4\xfd4Y\xa9') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) 17:31:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf5, 0x0) 17:31:47 executing program 4: 17:31:47 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:47 executing program 4: 17:31:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf6, 0x0) 17:31:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl(r0, 0x8000, &(0x7f0000000100)="f95d0fc83348f032daa0c8ef6ee7536825d672e9f6a2d0cbbeb5796b734538006624ff6d0a6d99df928a9a61d1f0bcf048a8dee914eeafb31ff7f16fb380660a13b31f30ed02192def03c8095e0df8a0024b0bf5812d2f4c4f6f70b722f2040b91fc9be0c1cf11937e11500ca06dac7b5b25ab3ea526881179de7f78f2be7f355eab6b089376fd418fcdf68093d4b3f0a5fca5d0c6ce67199032ce478e0b4813a200c94adacb917a5aab7200ea869218f6ee85a4a69f58eba0cffb6ea0edf06e1a7e3bfdb58dd5452d7c3e7894ec912b4c49") ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x40) 17:31:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e27) 17:31:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:47 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf7, 0x0) 17:31:47 executing program 4: 17:31:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e38) 17:31:47 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:47 executing program 4: 17:31:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000000c0)={0x9, 0x8000}) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000100)='net/ip6_flowlabel\x00') 17:31:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf8, 0x0) 17:31:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:47 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', 0x0, &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e41) 17:31:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf9, 0x0) 17:31:47 executing program 4: 17:31:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:47 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x440400, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000200)={'nat\x00', 0x0, 0x4, 0x87, [], 0x3, &(0x7f0000000100)=[{}, {}, {}], &(0x7f0000000140)=""/135}, &(0x7f0000000280)=0x78) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000001400), 0x0, 0x0) 17:31:47 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', 0x0, &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:47 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x40000800000009, @pix_mp}) 17:31:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e4a) 17:31:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfa, 0x0) 17:31:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', 0x0, &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:48 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e53) 17:31:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 17:31:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfb, 0x0) 17:31:48 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e59) 17:31:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:48 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfc, 0x0) 17:31:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x8, 0x1, 0x5, 0x0, 0x0, 0xbd6, 0x20004, 0x9, 0xffff, 0x7f, 0x3, 0x3, 0x5, 0x7, 0x8, 0x8, 0x1, 0x6, 0xcd08, 0x7, 0x8, 0x3f, 0x316, 0xffffffffffffff7a, 0x6, 0xfffffffffffffffa, 0x10000, 0x3f, 0x400000000, 0x2, 0xc0000, 0x8001, 0xa37, 0x1, 0x9, 0xfffffffffffffffe, 0x0, 0xfffffffffffffff9, 0x1, @perf_config_ext={0x401, 0x3}, 0x200, 0x7ff, 0x0, 0x7, 0x800, 0x1, 0x5}, r1, 0xf, 0xffffffffffffffff, 0x1) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000001c0)={0xb0d, 0x0, 0x200}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x7, 0x3}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000100)={{0x49, 0x101}, 'port0\x00', 0x80, 0x90000, 0x2ec00000, 0x2, 0x9, 0x6, 0x0, 0x0, 0x1, 0x9}) prctl$PR_SET_FPEXC(0xc, 0x30000) 17:31:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e62) 17:31:48 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfd, 0x0) 17:31:48 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:48 executing program 4: bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, 0x0, 0x0, 0x0) 17:31:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xfe, 0x0) 17:31:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e6b) 17:31:48 executing program 1: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/ipv6_route\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x11d}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x9, 0xfffffffffffffffc, 0x5, 0x1f, 0x800, 0xfff, 0x0, 0x6, r2}, 0x20) 17:31:48 executing program 4: bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, 0x0, 0x0, 0x0) 17:31:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x102, 0x0) 17:31:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x0, &(0x7f0000000180)='fuse\x00') 17:31:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e74) 17:31:49 executing program 4: bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, 0x0, 0x0, 0x0) 17:31:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x103, 0x0) 17:31:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x0, &(0x7f0000000180)='fuse\x00') 17:31:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 17:31:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x104, 0x0) 17:31:49 executing program 4: syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e7f) 17:31:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x0, &(0x7f0000000180)='fuse\x00') 17:31:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') sendmsg$nl_crypto(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="e80000001300080828bd7000fbdbdf257368613235362d6e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000704b77d670a7eb68000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000020000000000000000000000800010006000000"], 0xe8}, 0x1, 0x0, 0x0, 0x40080}, 0x48840) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/87, 0x57}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000300)='net/kcm\x00\b\x00', 0xffffffffffffffff}, 0x30) ptrace(0xffffffffffffffff, r2) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r3, 0xffffffffffffffb9, &(0x7f0000000080)) connect$caif(r0, &(0x7f00000002c0), 0x18) open(&(0x7f0000000280)='./file0\x00', 0x200, 0x10) 17:31:49 executing program 4: syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:49 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/kcm\x00\b\x00') preadv(r1, &(0x7f0000000100), 0x0, 0x0) 17:31:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x105, 0x0) 17:31:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e83) 17:31:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, 0x0) 17:31:49 executing program 4: syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x106, 0x0) 17:31:49 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746de2931394bc434e569f15022f6f64653d30303030303030303030303030303030303034303030302c75748c00fe375061", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) r1 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$user(&(0x7f0000001500)='user\x00', &(0x7f0000001540)={'syz', 0x1}, &(0x7f0000001580)="291b422e77f6e91b5e38ec574d3fe14714a883b3d47f876152082546c58a2cbaa357c1a22775f80715858ef06ae6adceac861038db7e2e4a49aa9d3cf47a20e15c039de791a307b343374b461b1bfc241f76e22209d972f4802a7d84fd36fa4bdd709d9b88055e069517be09e2b379805a25c45f0f49c4c8f1f9db0d9c54a2", 0x7f, 0xfffffffffffffffb) r3 = accept$netrom(0xffffffffffffffff, &(0x7f0000000340)={{}, [@null, @netrom, @bcast, @remote, @default, @bcast, @rose, @default]}, &(0x7f0000001680)=0x48) sendmsg(r3, &(0x7f0000001d80)={&(0x7f00000016c0)=@nfc={0x27, 0x1, 0x0, 0x5}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001740)="8fcfa3da533220d94e1c2f587a29e92691cca832efde61428629fd3225f6cdfe6d344c4177c6ed97cd0f3bb087586e32e92c22733cdcf7b6e0bb6877592ea164f963480f0f25d251203077d45329f194894fffd0c031d3e49f637e5e71d8ceceb6923f2fae34d3e8dfeab502982d98f6358429157979dc737efa09d4c2a0e16b387307e768a293c197bc084841a38ad33a8224", 0x93}, {&(0x7f0000001800)="c67183ec9d9d8be2a198f6084137de10ce48134424fd7fed63912ebbec13f3", 0x1f}, {&(0x7f0000001840)="db8885dd441dd2222acaa3aec790c43aa0a2329aa90485897423cede182cda1bcae9c8e8", 0x24}, {&(0x7f0000001880)}, {&(0x7f00000018c0)="a87cecff6bc55bf8da3d10981f762ef0496a895f1a6a05bd46ee3e661d6d69c0b6daf318ddc07ccdac85110a25a67e55e2f8797f97c30c1f538efc19c7c241e1f5ee605656beef02ebd6f548137cb3379615a793c5c1070f387fd8c985c18ccdb7e993904f932b3933", 0x69}, {&(0x7f0000001940)="9dd9c55a0907639d19ff697abd2f8cfcd3628f9d988f480e65b3e060e5ebddaf1ecb6c773b9d082d5eee2a0e61abecb48bd1e38cd168f6c18e85f631cf895b24f2e9907f3892132346eb833ae37e4049b80f612aec0abbc4cb4c82bcc81bcbd62b4b3533fcbc57bf6cd1e5fbd5c70533319bdd75d7070f18351c07fe925f50399efca0afc8daa8136e35d73b2b37f9af9a9c477d068257988700df2af812acee01f966de06fc1f17e0007d5a05f906c1a60a23a37d4968c0af7cd183ddc9b31a2af119b3a249ed88d5210ed36cc188406a1f1eb3724629c8a017390be26f6a54d5847da539874717d3ef40600c406737b2e48885fe1b3a1c12e8b3ec3f", 0xfd}, {&(0x7f0000001a40)="6255fa8abcb4bd3b1b9326f06c3f990c902ca9", 0x13}], 0x7, &(0x7f0000001e80)=ANY=[@ANYBLOB="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"], 0x250}, 0x854) keyctl$instantiate_iov(0x14, r1, &(0x7f0000001480)=[{&(0x7f0000000140)="b6cbcc14ec112e836b2b860eb683cd36461971acbc14f3ac220d05bda5ed15cc37fce937d36f22a4da18246f249b9c9e6712a01b4a4c53df113cc80b61ea623bc37dc2ef11ca53c8f6034913258aa1f7bad9926d632719967f8dea0c45a2f2fb9f92de76bdd1a084cf67248e8741d787e4ef6bc9cfc75850b4b0f43ad5a0e82e9f056512417c26a74e97d0295664ee7691c3a5979a2d8dafb70f1b7cfa947c5eab08d7f9624d05b272", 0xa9}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000002c0)="04136b4df129c7d83d7c98ddd0040f662941bb2c1d32af6cfe72cf99e020d03f9e6715a7ed8a261e5e259a0d4666f6f764e5fdb1a5e35fe3430aef835a142957a9fbc9a8cca96a52e964f3243314aced17946d120ddd5f59cc06428d34c41e3c98c2daf6f586", 0x66}, {&(0x7f0000000240)="0e6ab233d0f07ddc04", 0x9}, {&(0x7f00000013c0)="f18919c1deff8b1febc613549e2c64a232d1365ea49e9dd91a", 0x19}, {&(0x7f0000001400)="2d67785dac7cc2d9c3221caeb4c962c9651cfed47042294428412c5259e38ac62053739b755878970da46e386060a6be548ef32d175a8db8b7a9aa70fb144890774d33dffcc1", 0x46}], 0x6, r2) 17:31:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, 0x0) 17:31:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e94) 17:31:49 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, 0x0, 0x0) 17:31:49 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3f) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x804) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:49 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fa5b412c4a12ac512c077830630ac7f392cb2229a371e2c65a1297ca15c1862d41560831b680cbc8bf7e4cdfc0b691519f15fd0eff85f599c267c4d1cfd8e5f2510759f41d5f863fd812ec86cea3c597b1d02ff3c6bb1e9e25a4d0fdfd1e09"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x3b65, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0x0, 0x3}, 0x10) 17:31:49 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, 0x0, 0x0) 17:31:49 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x107, 0x0) 17:31:50 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, 0x0) 17:31:50 executing program 1 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000e9d) 17:31:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x108, 0x0) 17:31:50 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, 0x0, 0x0) 17:31:50 executing program 3 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x109, 0x0) 17:31:50 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) [ 537.123883][T12744] FAULT_INJECTION: forcing a failure. [ 537.123883][T12744] name failslab, interval 1, probability 0, space 0, times 0 [ 537.161166][T12744] CPU: 0 PID: 12744 Comm: syz-executor.1 Not tainted 5.1.0-rc3+ #51 [ 537.169480][T12744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.179553][T12744] Call Trace: [ 537.182876][T12744] dump_stack+0x172/0x1f0 [ 537.187250][T12744] should_fail.cold+0xa/0x15 [ 537.191956][T12744] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.197785][T12744] ? ___might_sleep+0x163/0x280 [ 537.202658][T12744] __should_failslab+0x121/0x190 [ 537.207618][T12744] should_failslab+0x9/0x14 [ 537.207635][T12744] __kmalloc+0x2dc/0x740 [ 537.207658][T12744] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 537.222637][T12744] ? _kstrtoull+0x14c/0x200 [ 537.227159][T12744] ? _parse_integer+0x190/0x190 [ 537.232049][T12744] ? rw_copy_check_uvector+0x28c/0x330 [ 537.237536][T12744] rw_copy_check_uvector+0x28c/0x330 [ 537.242851][T12744] import_iovec+0xbf/0x200 [ 537.242871][T12744] ? dup_iter+0x260/0x260 [ 537.242887][T12744] ? __fget+0x35a/0x550 [ 537.242907][T12744] vfs_readv+0xc6/0x160 [ 537.242921][T12744] ? lock_downgrade+0x880/0x880 [ 537.242937][T12744] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 537.242954][T12744] ? kasan_check_read+0x11/0x20 [ 537.242973][T12744] ? __fget+0x381/0x550 [ 537.271125][T12744] ? ksys_dup3+0x3e0/0x3e0 [ 537.271148][T12744] ? wait_for_completion+0x440/0x440 [ 537.271167][T12744] ? __fget_light+0x1a9/0x230 [ 537.271198][T12744] do_preadv+0x1c4/0x280 [ 537.271221][T12744] ? do_readv+0x290/0x290 [ 537.271237][T12744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.271252][T12744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.271266][T12744] ? do_syscall_64+0x26/0x610 [ 537.271280][T12744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 17:31:50 executing program 2 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ea6) 17:31:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10a, 0x0) [ 537.271293][T12744] ? do_syscall_64+0x26/0x610 [ 537.271314][T12744] __x64_sys_preadv+0x9a/0xf0 [ 537.278115][T12755] FAULT_INJECTION: forcing a failure. [ 537.278115][T12755] name failslab, interval 1, probability 0, space 0, times 0 [ 537.280355][T12744] do_syscall_64+0x103/0x610 [ 537.308771][T12744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.308785][T12744] RIP: 0033:0x4582b9 [ 537.308800][T12744] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.308808][T12744] RSP: 002b:00007f7cd8297c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 537.308823][T12744] RAX: ffffffffffffffda RBX: 00007f7cd8297c90 RCX: 00000000004582b9 [ 537.308839][T12744] RDX: 1000000000000241 RSI: 0000000020000480 RDI: 0000000000000005 [ 537.346927][T12744] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 537.346937][T12744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7cd82986d4 [ 537.346945][T12744] R13: 00000000004c4d80 R14: 00000000004d8a68 R15: 0000000000000006 [ 537.355661][T12755] CPU: 0 PID: 12755 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #51 [ 537.421612][T12755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.421620][T12755] Call Trace: [ 537.421646][T12755] dump_stack+0x172/0x1f0 [ 537.421667][T12755] should_fail.cold+0xa/0x15 [ 537.421688][T12755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.467025][T12755] ? ___might_sleep+0x163/0x280 17:31:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10b, 0x0) 17:31:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000eaf) [ 537.467047][T12755] __should_failslab+0x121/0x190 [ 537.467062][T12755] should_failslab+0x9/0x14 [ 537.467078][T12755] __kmalloc_track_caller+0x2d8/0x740 [ 537.467097][T12755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 537.467109][T12755] ? fput_many+0x12c/0x1a0 [ 537.467123][T12755] ? strndup_user+0x77/0xd0 [ 537.467141][T12755] memdup_user+0x26/0xb0 [ 537.467157][T12755] strndup_user+0x77/0xd0 [ 537.467171][T12755] ksys_mount+0x3c/0x150 [ 537.467197][T12755] __x64_sys_mount+0xbe/0x150 [ 537.467223][T12755] do_syscall_64+0x103/0x610 17:31:50 executing program 1 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) 17:31:50 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) [ 537.467243][T12755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.467255][T12755] RIP: 0033:0x4582b9 [ 537.467271][T12755] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.467287][T12755] RSP: 002b:00007fdf78a9ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 537.477116][T12755] RAX: ffffffffffffffda RBX: 00007fdf78a9ec90 RCX: 00000000004582b9 [ 537.477126][T12755] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 [ 537.477135][T12755] RBP: 000000000073c040 R08: 0000000020000180 R09: 0000000000000000 [ 537.477144][T12755] R10: 0000000000008820 R11: 0000000000000246 R12: 00007fdf78a9f6d4 [ 537.477153][T12755] R13: 00000000004c4044 R14: 00000000004d7658 R15: 0000000000000003 17:31:50 executing program 3 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 537.630448][T12764] FAULT_INJECTION: forcing a failure. [ 537.630448][T12764] name failslab, interval 1, probability 0, space 0, times 0 [ 537.680834][T12769] FAULT_INJECTION: forcing a failure. [ 537.680834][T12769] name failslab, interval 1, probability 0, space 0, times 0 [ 537.727168][T12764] CPU: 1 PID: 12764 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #51 [ 537.735495][T12764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.745568][T12764] Call Trace: [ 537.748885][T12764] dump_stack+0x172/0x1f0 [ 537.753334][T12764] should_fail.cold+0xa/0x15 [ 537.757963][T12764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.763804][T12764] ? ___might_sleep+0x163/0x280 [ 537.768771][T12764] __should_failslab+0x121/0x190 17:31:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10c, 0x0) [ 537.773842][T12764] should_failslab+0x9/0x14 [ 537.778562][T12764] kmem_cache_alloc+0x2b2/0x6f0 [ 537.783435][T12764] ? get_pid_task+0xc9/0x190 [ 537.788054][T12764] ? __f_unlock_pos+0x19/0x20 [ 537.792763][T12764] getname_flags+0xd6/0x5b0 [ 537.797320][T12764] user_path_at_empty+0x2f/0x50 [ 537.802281][T12764] vfs_statx+0x129/0x200 [ 537.806556][T12764] ? vfs_statx_fd+0xc0/0xc0 [ 537.811078][T12764] ? kasan_check_write+0x14/0x20 [ 537.816821][T12764] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 537.822754][T12764] __do_sys_newstat+0xa4/0x130 [ 537.827564][T12764] ? cp_new_stat+0x5f0/0x5f0 [ 537.832177][T12764] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 537.838448][T12764] ? fput_many+0x12c/0x1a0 [ 537.842886][T12764] ? fput+0x1b/0x20 [ 537.846813][T12764] ? ksys_write+0x166/0x1f0 [ 537.851604][T12764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.858672][T12764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.866098][T12764] ? do_syscall_64+0x26/0x610 [ 537.870803][T12764] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.876896][T12764] ? do_syscall_64+0x26/0x610 [ 537.881593][T12764] ? lockdep_hardirqs_on+0x418/0x5d0 [ 537.887106][T12764] __x64_sys_newstat+0x54/0x80 [ 537.891894][T12764] do_syscall_64+0x103/0x610 [ 537.896517][T12764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.902426][T12764] RIP: 0033:0x4582b9 [ 537.906345][T12764] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.926484][T12764] RSP: 002b:00007f9a3a511c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 537.934910][T12764] RAX: ffffffffffffffda RBX: 00007f9a3a511c90 RCX: 00000000004582b9 [ 537.942895][T12764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 537.950886][T12764] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 537.960719][T12764] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a3a5126d4 [ 537.969154][T12764] R13: 00000000004e2cfb R14: 00000000004dc0f8 R15: 0000000000000004 [ 537.981712][T12769] CPU: 0 PID: 12769 Comm: syz-executor.1 Not tainted 5.1.0-rc3+ #51 [ 537.990253][T12769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.000364][T12769] Call Trace: [ 538.003680][T12769] dump_stack+0x172/0x1f0 [ 538.008046][T12769] should_fail.cold+0xa/0x15 [ 538.012746][T12769] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.018575][T12769] ? ___might_sleep+0x163/0x280 [ 538.023453][T12769] __should_failslab+0x121/0x190 [ 538.028408][T12769] should_failslab+0x9/0x14 [ 538.032942][T12769] kmem_cache_alloc_node_trace+0x270/0x720 [ 538.038772][T12769] ? fsnotify+0x811/0xbc0 [ 538.043289][T12769] __kmalloc_node+0x3d/0x70 [ 538.047824][T12769] kvmalloc_node+0x68/0x100 [ 538.052351][T12769] seq_read+0x832/0x1130 [ 538.056629][T12769] ? rw_verify_area+0x118/0x360 [ 538.061517][T12769] do_iter_read+0x4a9/0x660 [ 538.061534][T12769] ? dup_iter+0x260/0x260 [ 538.061557][T12769] vfs_readv+0xf0/0x160 [ 538.061571][T12769] ? lock_downgrade+0x880/0x880 [ 538.061594][T12769] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 538.085962][T12769] ? kasan_check_read+0x11/0x20 [ 538.090862][T12769] ? ksys_dup3+0x3e0/0x3e0 [ 538.098348][T12769] ? wait_for_completion+0x440/0x440 [ 538.103672][T12769] ? __fget_light+0x1a9/0x230 [ 538.108412][T12769] do_preadv+0x1c4/0x280 [ 538.112856][T12769] ? do_readv+0x290/0x290 [ 538.114463][T12782] FAULT_INJECTION: forcing a failure. [ 538.114463][T12782] name failslab, interval 1, probability 0, space 0, times 0 [ 538.118081][T12769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.118097][T12769] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.118112][T12769] ? do_syscall_64+0x26/0x610 [ 538.118137][T12769] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.152525][T12769] ? do_syscall_64+0x26/0x610 [ 538.157251][T12769] __x64_sys_preadv+0x9a/0xf0 [ 538.161958][T12769] do_syscall_64+0x103/0x610 [ 538.166756][T12769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.172754][T12769] RIP: 0033:0x4582b9 [ 538.176752][T12769] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.196631][T12769] RSP: 002b:00007f7cd8297c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 538.205258][T12769] RAX: ffffffffffffffda RBX: 00007f7cd8297c90 RCX: 00000000004582b9 [ 538.214035][T12769] RDX: 1000000000000241 RSI: 0000000020000480 RDI: 0000000000000005 17:31:51 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000eb5) 17:31:51 executing program 2 (fault-call:4 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) [ 538.222017][T12769] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 538.229999][T12769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7cd82986d4 [ 538.238428][T12769] R13: 00000000004c4d80 R14: 00000000004d8a68 R15: 0000000000000006 [ 538.246440][T12782] CPU: 1 PID: 12782 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #51 [ 538.254989][T12782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.265251][T12782] Call Trace: [ 538.268570][T12782] dump_stack+0x172/0x1f0 [ 538.272946][T12782] should_fail.cold+0xa/0x15 17:31:51 executing program 1 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) [ 538.277658][T12782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.283526][T12782] ? ___might_sleep+0x163/0x280 [ 538.288392][T12782] __should_failslab+0x121/0x190 [ 538.293331][T12782] should_failslab+0x9/0x14 [ 538.297925][T12782] __kmalloc_track_caller+0x2d8/0x740 [ 538.303682][T12782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.310225][T12782] ? strndup_user+0x77/0xd0 [ 538.315304][T12782] memdup_user+0x26/0xb0 [ 538.319949][T12782] strndup_user+0x77/0xd0 [ 538.324378][T12782] ksys_mount+0x7b/0x150 [ 538.328645][T12782] __x64_sys_mount+0xbe/0x150 [ 538.333328][T12782] do_syscall_64+0x103/0x610 [ 538.337922][T12782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.346214][T12782] RIP: 0033:0x4582b9 [ 538.350337][T12782] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.370555][T12782] RSP: 002b:00007fdf78ae0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 538.380068][T12782] RAX: ffffffffffffffda RBX: 00007fdf78ae0c90 RCX: 00000000004582b9 [ 538.388491][T12782] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 [ 538.396473][T12782] RBP: 000000000073bf00 R08: 0000000020000180 R09: 0000000000000000 [ 538.404701][T12782] R10: 0000000000008820 R11: 0000000000000246 R12: 00007fdf78ae16d4 [ 538.413643][T12782] R13: 00000000004c4044 R14: 00000000004d7658 R15: 0000000000000004 17:31:51 executing program 3 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:51 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose={0xbb, 0xbb, 0xbb, 0x2}, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:51 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10d, 0x0) [ 538.586279][T12799] FAULT_INJECTION: forcing a failure. [ 538.586279][T12799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 538.599524][T12799] CPU: 1 PID: 12799 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #51 [ 538.607523][T12799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.617598][T12799] Call Trace: [ 538.620919][T12799] dump_stack+0x172/0x1f0 [ 538.625297][T12799] should_fail.cold+0xa/0x15 [ 538.629924][T12799] ? fault_create_debugfs_attr+0x1e0/0x1e0 17:31:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000241, 0x0) [ 538.635761][T12799] ? __lock_acquire+0x548/0x3fb0 [ 538.640729][T12799] ? is_dynamic_key+0x1c0/0x1c0 [ 538.645611][T12799] should_fail_alloc_page+0x50/0x60 [ 538.650866][T12799] __alloc_pages_nodemask+0x1a1/0x7e0 [ 538.651199][T12802] FAULT_INJECTION: forcing a failure. [ 538.651199][T12802] name failslab, interval 1, probability 0, space 0, times 0 [ 538.656294][T12799] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 538.656309][T12799] ? find_held_lock+0x35/0x130 [ 538.656331][T12799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.656349][T12799] cache_grow_begin+0x9c/0x860 [ 538.656364][T12799] ? getname_flags+0xd6/0x5b0 [ 538.656378][T12799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.656395][T12799] kmem_cache_alloc+0x62d/0x6f0 [ 538.656407][T12799] ? get_pid_task+0xc9/0x190 [ 538.656425][T12799] getname_flags+0xd6/0x5b0 [ 538.656443][T12799] user_path_at_empty+0x2f/0x50 [ 538.656465][T12799] vfs_statx+0x129/0x200 [ 538.724802][T12799] ? vfs_statx_fd+0xc0/0xc0 [ 538.729328][T12799] ? kasan_check_write+0x14/0x20 [ 538.734290][T12799] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 538.739864][T12799] __do_sys_newstat+0xa4/0x130 [ 538.744671][T12799] ? cp_new_stat+0x5f0/0x5f0 [ 538.749497][T12799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 538.755764][T12799] ? fput_many+0x12c/0x1a0 [ 538.760907][T12799] ? fput+0x1b/0x20 [ 538.767367][T12799] ? ksys_write+0x166/0x1f0 [ 538.771908][T12799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.777391][T12799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.782968][T12799] ? do_syscall_64+0x26/0x610 [ 538.788209][T12799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.794329][T12799] ? do_syscall_64+0x26/0x610 [ 538.799217][T12799] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.804545][T12799] __x64_sys_newstat+0x54/0x80 [ 538.809335][T12799] do_syscall_64+0x103/0x610 [ 538.814066][T12799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.819998][T12799] RIP: 0033:0x4582b9 [ 538.824279][T12799] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.845651][T12799] RSP: 002b:00007f9a3a511c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 538.854252][T12799] RAX: ffffffffffffffda RBX: 00007f9a3a511c90 RCX: 00000000004582b9 [ 538.862238][T12799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 538.870229][T12799] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 538.878326][T12799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a3a5126d4 [ 538.886333][T12799] R13: 00000000004e2cfb R14: 00000000004dc0f8 R15: 0000000000000004 [ 538.896081][T12802] CPU: 0 PID: 12802 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #51 [ 538.904087][T12802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.914172][T12802] Call Trace: [ 538.914215][T12802] dump_stack+0x172/0x1f0 [ 538.914236][T12802] should_fail.cold+0xa/0x15 [ 538.914252][T12802] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.914270][T12802] ? ___might_sleep+0x163/0x280 17:31:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ebe) [ 538.914287][T12802] __should_failslab+0x121/0x190 [ 538.914301][T12802] should_failslab+0x9/0x14 [ 538.914316][T12802] kmem_cache_alloc_trace+0x2d1/0x760 [ 538.914334][T12802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.914358][T12802] ? _copy_from_user+0xdd/0x150 [ 538.937348][T12802] copy_mount_options+0x5c/0x3a0 [ 538.937368][T12802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.937384][T12802] ksys_mount+0xa7/0x150 [ 538.937399][T12802] __x64_sys_mount+0xbe/0x150 17:31:52 executing program 2 (fault-call:4 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:52 executing program 3 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') [ 538.937419][T12802] do_syscall_64+0x103/0x610 [ 538.937438][T12802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.937450][T12802] RIP: 0033:0x4582b9 [ 538.937465][T12802] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.937472][T12802] RSP: 002b:00007fdf78abfc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 538.937486][T12802] RAX: ffffffffffffffda RBX: 00007fdf78abfc90 RCX: 00000000004582b9 [ 538.937495][T12802] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 [ 538.937503][T12802] RBP: 000000000073bfa0 R08: 0000000020000180 R09: 0000000000000000 [ 538.937512][T12802] R10: 0000000000008820 R11: 0000000000000246 R12: 00007fdf78ac06d4 [ 538.937520][T12802] R13: 00000000004c4044 R14: 00000000004d7658 R15: 0000000000000004 17:31:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10e, 0x0) 17:31:52 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x1c}, @remote, @null, @null, @bcast, @bcast]}, 0x40) [ 539.205751][T12816] FAULT_INJECTION: forcing a failure. [ 539.205751][T12816] name failslab, interval 1, probability 0, space 0, times 0 17:31:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000002, 0x0) [ 539.257587][T12816] CPU: 1 PID: 12816 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #51 [ 539.266167][T12816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.276686][T12816] Call Trace: [ 539.280015][T12816] dump_stack+0x172/0x1f0 [ 539.284384][T12816] should_fail.cold+0xa/0x15 17:31:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ec7) [ 539.289004][T12816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.308218][T12816] ? ___might_sleep+0x163/0x280 [ 539.313142][T12816] __should_failslab+0x121/0x190 [ 539.318121][T12816] should_failslab+0x9/0x14 [ 539.322643][T12816] kmem_cache_alloc+0x2b2/0x6f0 [ 539.327526][T12816] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 539.333180][T12816] ? find_held_lock+0x35/0x130 [ 539.337984][T12816] getname_flags+0xd6/0x5b0 [ 539.342513][T12816] user_path_at_empty+0x2f/0x50 [ 539.347511][T12816] do_mount+0x150/0x2c40 [ 539.351764][T12816] ? copy_mount_options+0x5c/0x3a0 [ 539.356890][T12816] ? copy_mount_string+0x40/0x40 [ 539.361841][T12816] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.368092][T12816] ? _copy_from_user+0xdd/0x150 [ 539.372971][T12816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.379222][T12816] ? copy_mount_options+0x280/0x3a0 [ 539.384422][T12816] ksys_mount+0xdb/0x150 [ 539.388693][T12816] __x64_sys_mount+0xbe/0x150 [ 539.393407][T12816] do_syscall_64+0x103/0x610 [ 539.398039][T12816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.404300][T12816] RIP: 0033:0x4582b9 [ 539.408223][T12816] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.428746][T12816] RSP: 002b:00007fdf78ae0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 539.437195][T12816] RAX: ffffffffffffffda RBX: 00007fdf78ae0c90 RCX: 00000000004582b9 [ 539.445531][T12816] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 17:31:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) [ 539.453567][T12816] RBP: 000000000073bf00 R08: 0000000020000180 R09: 0000000000000000 [ 539.461574][T12816] R10: 0000000000008820 R11: 0000000000000246 R12: 00007fdf78ae16d4 [ 539.469663][T12816] R13: 00000000004c4044 R14: 00000000004d7658 R15: 0000000000000004 17:31:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x10f, 0x0) 17:31:52 executing program 3 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:52 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x20000040}, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:31:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ed0) [ 539.707889][T12905] FAULT_INJECTION: forcing a failure. [ 539.707889][T12905] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 539.721831][T12905] CPU: 0 PID: 12905 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #51 [ 539.721845][T12905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.721851][T12905] Call Trace: [ 539.721886][T12905] dump_stack+0x172/0x1f0 [ 539.743227][T12905] should_fail.cold+0xa/0x15 [ 539.743249][T12905] ? fault_create_debugfs_attr+0x1e0/0x1e0 17:31:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000003, 0x0) 17:31:52 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x110, 0x0) 17:31:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) times(&(0x7f00000003c0)) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f00000000c0)) write$FUSE_OPEN(r2, &(0x7f0000000140)={0x20, 0x0, 0x7, {0x0, 0x2}}, 0x20) [ 539.743265][T12905] ? __lock_acquire+0x548/0x3fb0 [ 539.743278][T12905] ? __save_stack_trace+0x99/0x100 [ 539.743298][T12905] should_fail_alloc_page+0x50/0x60 [ 539.743313][T12905] __alloc_pages_nodemask+0x1a1/0x7e0 [ 539.743334][T12905] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 539.784742][T12905] ? find_held_lock+0x35/0x130 [ 539.790281][T12905] ? __x64_sys_mount+0xbe/0x150 [ 539.795169][T12905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.801215][T12905] cache_grow_begin+0x9c/0x860 [ 539.806215][T12905] ? getname_flags+0xd6/0x5b0 [ 539.811368][T12905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.817929][T12905] kmem_cache_alloc+0x62d/0x6f0 [ 539.822899][T12905] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 539.830766][T12905] ? find_held_lock+0x35/0x130 [ 539.840879][T12905] getname_flags+0xd6/0x5b0 [ 539.847073][T12905] user_path_at_empty+0x2f/0x50 [ 539.852477][T12905] do_mount+0x150/0x2c40 17:31:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x40, 0xb}, @remote, @null, @null, @bcast, @bcast]}, 0x40) [ 539.856746][T12905] ? copy_mount_options+0x5c/0x3a0 [ 539.856762][T12905] ? copy_mount_string+0x40/0x40 [ 539.856778][T12905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.856802][T12905] ? _copy_from_user+0xdd/0x150 [ 539.877952][T12905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.884238][T12905] ? copy_mount_options+0x280/0x3a0 [ 539.889557][T12905] ksys_mount+0xdb/0x150 [ 539.889575][T12905] __x64_sys_mount+0xbe/0x150 [ 539.889596][T12905] do_syscall_64+0x103/0x610 17:31:53 executing program 3 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x111, 0x0) [ 539.889615][T12905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.889626][T12905] RIP: 0033:0x4582b9 [ 539.889641][T12905] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.889648][T12905] RSP: 002b:00007fdf78abfc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 539.889661][T12905] RAX: ffffffffffffffda RBX: 00007fdf78abfc90 RCX: 00000000004582b9 [ 539.889668][T12905] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 [ 539.889676][T12905] RBP: 000000000073bfa0 R08: 0000000020000180 R09: 0000000000000000 [ 539.889684][T12905] R10: 0000000000008820 R11: 0000000000000246 R12: 00007fdf78ac06d4 [ 539.889691][T12905] R13: 00000000004c4044 R14: 00000000004d7658 R15: 0000000000000004 17:31:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x1c}, @null, @bcast, @bcast]}, 0x40) 17:31:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000edb) 17:31:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000480)="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", 0xfb) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x112, 0x0) 17:31:53 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000004, 0x0) 17:31:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x20000040}, @null, @bcast, @bcast]}, 0x40) 17:31:53 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x02', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x113, 0x0) 17:31:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="1881d2bc02cfcac46dfb69e4a6881fde2ad0e45cb44fbc96a2877b14d4dddf796acd5695f617c2ee90ca3186844b616976f8c28a997e2bf45fa8231099d0d4d4a1cdfe095e82435e52dffe52cbe042df085d634cde35be59021f5ed431f1b9a542704a1cf0755587e99248d796d8ce9fed647ab5d532539c2a304e9f41ac0ef81fd6cf18c11b087ea209b1cabf3662f4099e7c2da7325e33fa2c64332264399e79a46df47d", 0xa5, 0x591}, {&(0x7f0000000340)="9b026d85f39b92959518c481c81354c4580041c7a4427ea29b1efb8757fcf62afbf7975e3d768582de9daaf1d7a19b26c3fc1bfe069d612ca16116d8d9f576c559eae2b61dedf64adc4df657c7140c2ca9f15f968da90df9888635bb6fed62d2e768b6dbab97f1345d574e9ea80932d6cd0172cb35c1eda8b8c7017079aac7feace4eb70f5", 0x85, 0x3ff}], 0x4, &(0x7f0000000480)={[{@fat=@tz_utc='tz=UTC'}, {@fat=@gid={'gid', 0x3d, r1}}, {@fat=@tz_utc='tz=UTC'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@fmask={'fmask', 0x3d, 0x7fff}}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000edf) 17:31:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x1c}, @null, @bcast, @bcast]}, 0x40) 17:31:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000005, 0x0) 17:31:53 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x114, 0x0) [ 540.636479][T13215] FAT-fs (loop2): bogus number of reserved sectors 17:31:53 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\xc0', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x20000040}, @null, @bcast, @bcast]}, 0x40) 17:31:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ef0) [ 540.720330][T13215] FAT-fs (loop2): Can't find a valid FAT filesystem 17:31:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x115, 0x0) [ 540.846528][T13221] FAT-fs (loop2): bogus number of reserved sectors [ 540.853461][T13221] FAT-fs (loop2): Can't find a valid FAT filesystem 17:31:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000006, 0x0) 17:31:54 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x1c}, @null, @bcast, @bcast]}, 0x40) 17:31:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x1, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000380)={0x0, 0xf000, 0x101, 0x8, 0x13}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_triestat\x00') ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e20, @local}, {0x2, 0x4e21, @rand_addr=0x4}, 0x40, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0xaaac, 0xd3be}) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r4}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f00000000c0)='@cpuset\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80421, &(0x7f0000000480)={'trans=virtio,', {[{@mmap='mmap'}, {@access_client='access=client'}, {@aname={'aname', 0x3d, '/dev/fuse\x00'}}, {@afid={'afid', 0x3d, 0x9}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x4}}], [{@euid_gt={'euid>', r3}}, {@fsname={'fsname', 0x3d, '/dev/fuse\x00'}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x25}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_measure='dont_measure'}]}}) 17:31:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ef9) 17:31:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x116, 0x0) 17:31:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:54 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x20000040}, @null, @bcast, @bcast]}, 0x40) 17:31:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f02) 17:31:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x117, 0x0) 17:31:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000007, 0x0) 17:31:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) set_thread_area(&(0x7f00000000c0)={0x4, 0x20001000, 0xde876e9dfe0fb148, 0x9, 0xffff, 0x1, 0x0, 0x2, 0xe6d, 0x7}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:54 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x40, 0x1c}, @null, @bcast, @bcast]}, 0x40) 17:31:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f0b) 17:31:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x118, 0x0) 17:31:54 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x40, 0x20000040}, @null, @bcast, @bcast]}, 0x40) 17:31:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000008, 0x0) 17:31:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x2c25888c, 0x200) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000240)={0x0, r2}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x90880, &(0x7f00000003c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@subj_type={'subj_type', 0x3d, ',#$'}}, {@uid_lt={'uid<', r3}}, {@measure='measure'}, {@euid_eq={'euid', 0x3d, r3}}]}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2cdeb0e08eae805dc90060363da63943be396f50b58c9d202ca409f5f82968e3"]) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:54 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x119, 0x0) 17:31:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f11) 17:31:54 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x40, 0x40, 0x1c}, @null, @bcast, @bcast]}, 0x40) 17:31:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11a, 0x0) 17:31:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x101}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x40) 17:31:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000009, 0x0) 17:31:55 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x40, 0x40, 0x20000040}, @null, @bcast, @bcast]}, 0x40) 17:31:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f1a) 17:31:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x8c', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 17:31:55 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x40, 0x40, 0x40, 0x1c}, @null, @bcast, @bcast]}, 0x40) 17:31:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11c, 0x0) 17:31:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f23) 17:31:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02000000010003000000000002000700", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r1, @ANYBLOB="02000400", @ANYRES32=r1, @ANYBLOB="02000400", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r1, @ANYBLOB="02000400", @ANYRES32=r1, @ANYBLOB="02000600", @ANYRES32=r1, @ANYBLOB="04002900000000007fe91d12", @ANYRES32=r2, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="08000400", @ANYRES32=r2, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="10000400000000002000000000000000"], 0x94, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\xf6', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000a, 0x0) 17:31:55 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null={0x40, 0x40, 0x40, 0x40, 0x40, 0x20000040}, @null, @bcast, @bcast]}, 0x40) 17:31:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11d, 0x0) 17:31:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f2c) 17:31:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) openat$cgroup_ro(r2, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000080), 0x4) stat(&(0x7f00000000c0)='./file0\x00', 0x0) 17:31:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:55 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x1c}, @bcast, @bcast]}, 0x40) 17:31:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11e, 0x0) 17:31:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000b, 0x0) 17:31:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="66643d9a5f2d8480da5c9e221315a2a116f622f5c9bf9ed633f9dea9b1c6b60465755bf1b4e0decf23e4ac9c1a9b05d42f6e0b5e36e31f3a21f351d3970c2aab2d04eb7ec4106c5e09e8259ca1c68bce2ecf4faaab8d7aa07bb4f91ae22ac242afc9c44b5c60eb6111f06842f6d115ad6adaa00639be2272e128ba820aa1ea48c9d055a8fecb4ce3174cfd536e468947427af8c9fc6353d68c756ccf8769a0c87b2e09ebc192e4e95ba4a644b2b018f66bf5333a253578", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000340)="0d20be00880820ffe250a1ba2c4af2fb613d17b0ae7bd7938dfa484465adce4cdff5b531af5213a86617784595c63ad3877716a16d0ff2c2bc1a6644a5c6110feea906cd07307088e8459f98c4839cf1e03a476ff78738b79227e9866acf5fdc7528261a67b0a5a8b6ef0405d20641624c9b94c7f89d2af86775eed4408ba334b1ef6bf108b88367724a159e90e13f794af66a158c40", 0x96, 0x3ff}, {&(0x7f0000000480)="babe4d165e8fc389fec022b9a0ba33bc00a441f0a327895848ae1aa23caef97aab1f014649f3a2db38469b4d308cad210853c6bad4d2c35808abf9df2e2a0bbad1f7fa26b5f287957a20b9277790e6bce2edd68548200b36a5635da72bc464e48a6d451ea3dadbe714eb97bec472f6387bd811266a35552f1dacc85fad21e7705b7c4953f74bb8ca39b7fc74b9841c58303d163f4cb781a5bd6812bdf3dc3d7cd843addb8b08b3015cc65e71ac0f316e0d4aeb388ac4ea78540589866526fa0ab71b8a76b9a088bb033af8dcb6c5082ef7c6506a7583c74b", 0xd8, 0x71d59d00}], 0x120084, &(0x7f0000000580)={[{@show_sys_files_yes='show_sys_files=yes'}, {@disable_sparse_no='disable_sparse=no'}], [{@measure='measure'}, {@uid_gt={'uid>', r1}}, {@dont_appraise='dont_appraise'}, {@subj_role={'subj_role', 0x3d, 'rootmode'}}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffff81}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) stat(&(0x7f0000000040)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:31:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f37) 17:31:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x20000040}, @bcast, @bcast]}, 0x40) 17:31:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x11f, 0x0) 17:31:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f3b) 17:31:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000c, 0x0) 17:31:56 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="0300"]) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x1c}, @bcast, @bcast]}, 0x40) 17:31:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x120, 0x0) 17:31:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f4c) 17:31:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000d, 0x0) 17:31:56 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x20000040}, @bcast, @bcast]}, 0x40) 17:31:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x20}}]}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x121, 0x0) 17:31:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x122, 0x0) 17:31:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x1c}, @bcast, @bcast]}, 0x40) 17:31:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f55) 17:31:56 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000e, 0x0) 17:31:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x20000040}, @bcast, @bcast]}, 0x40) 17:31:56 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x123, 0x0) 17:31:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f5e) 17:31:56 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='.2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000f, 0x0) 17:31:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) socketpair(0xb, 0x0, 0xffffffff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) connect$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, [@default, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40) stat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000003c0)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000740)={0x0}, &(0x7f0000000780)=0xc) sendmsg$unix(r4, &(0x7f0000000900)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000480)="9a503113f05ecd36a0569dc80902f24674f32918d32b13b488989ca4d74b68c1233431427ea11ba08c54732116c202952303546699217372b5492a86ddffb1d345723bc25fbcc493242dc7399b6d54d9c4a72f056de03e7cbd87299d558ff64bab20e20fdfdefe6cd54c6cd9ab9eec3af3c19eadfdd07442ed9284693e8cee6d79ee10457c843108bcdff0d9c497d698200a", 0x92}, {&(0x7f0000000540)="b188ffe2732966de228887c154cbac3031bed6b0aec58f102a2ce13f597ba272013a98a988e236148c6b089c251c80af9bbc1c258ddec1a8c5ceea891fe59bf673ffdc2632133c36d2da092199c7a16ecb613a57a0e8c699cc06bc16a9fc3b90f5ec09d77f82e42d58aa058040f90aff25b2f920080e1a092db2a67ac0edd3d97c2cfb06f000495583a36dfb6e0e0b42956dc37e4de4f805c2ac7ab18b762713944f867b03c98bfdf7b748daecf3a160bf44de13bb83e9a84fe1da8ec87dddaca78594e8cd2c93867e85a0d71816758fb423b87587838d", 0xd7}, {&(0x7f00000001c0)="6cb77aa84bafa75a2c76c10effbe95f991e138734ec5f33b6a7628b7", 0x1c}], 0x3, &(0x7f00000007c0)=[@cred={0x20, 0x1, 0x2, r5, r1, r2}, @cred={0x20, 0x1, 0x2, r6, r1, r2}, @rights={0x18, 0x1, 0x1, [r3]}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @rights={0x18, 0x1, 0x1, [r4]}, @rights={0x28, 0x1, 0x1, [r4, r0, r3, r0, r3, r4]}, @cred={0x20, 0x1, 0x2, r7, r1, r2}, @rights={0x30, 0x1, 0x1, [r3, r3, r4, r4, r0, r3, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r1, r2}], 0x128, 0x801}, 0x20004084) 17:31:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x124, 0x0) 17:31:57 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x40, 0x1c}, @bcast, @bcast]}, 0x40) 17:31:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f67) 17:31:57 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='/2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000010, 0x0) 17:31:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x125, 0x0) 17:31:57 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2.s\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:57 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x40, 0x20000040}, @bcast, @bcast]}, 0x40) 17:31:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f6d) 17:31:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000011, 0x0) 17:31:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = getpid() ptrace$getregset(0x4204, r2, 0x200, &(0x7f0000000080)={&(0x7f0000000480)=""/233, 0xe9}) 17:31:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x126, 0x0) 17:31:57 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x40, 0x40, 0x1c}, @bcast, @bcast]}, 0x40) 17:31:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f76) 17:31:57 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2/s\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:57 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x127, 0x0) 17:31:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000012, 0x0) 17:31:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:57 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x40, 0x40, 0x20000040}, @bcast, @bcast]}, 0x40) 17:31:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f7f) 17:31:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x02', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x128, 0x0) 17:31:58 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x40, 0x40, 0x40, 0x1c}, @bcast, @bcast]}, 0x40) 17:31:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000013, 0x0) 17:31:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\xc0', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x129, 0x0) 17:31:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f88) 17:31:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) r3 = accept4(0xffffffffffffffff, &(0x7f0000000580)=@x25={0x9, @remote}, &(0x7f0000000600)=0x80, 0x80800) connect$pptp(r3, &(0x7f0000000640)={0x18, 0x2, {0x0, @remote}}, 0x1e) stat(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x10) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x8001, 0x3, &(0x7f0000000480)=[{&(0x7f00000001c0)="d4db52e8e7dc7c3f0fb4866c726116f6ebfb", 0x12, 0x6}, {&(0x7f0000000340)="172248457967bf796d45b1b14b2bc8b9759a79f79be82eb43fe304d14e14bc2ac25d7b713b587cd03def3f86912baed1ce97ecb8a8393937e334391c442b153702e4524e9e9630317dd36e2db59d082636cdf8538d84eec952cf51a2579f9f365c0b53d60d115b2cf7d4432e0e795ba4e705e66759df145c27fc6b7e85bc71f0ea5c3b1992b5eb6874e416ebcfeab939e6c068a20b727e0e66e7f8360a", 0x9d}, {&(0x7f0000000240)="10d0bb3c52c3ea4a74e01d790a060988d7ffccb4177aac", 0x17, 0x7}], 0x20000, &(0x7f0000000500)={[{@nosuiddir='nosuiddir'}], [{@uid_eq={'uid', 0x3d, r1}}, {@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, 'fd'}}, {@uid_eq={'uid', 0x3d, r1}}]}) 17:31:58 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null={0x40, 0x40, 0x40, 0x40, 0x40, 0x20000040}, @bcast, @bcast]}, 0x40) 17:31:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000014, 0x0) 17:31:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f93) 17:31:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12a, 0x0) 17:31:58 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast={0xa2, 0xa6, 0xa8, 0x1c}, @bcast]}, 0x40) 17:31:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x101000, 0x0) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x400) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x802, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) write(r4, &(0x7f0000000080)="240000001a0025f0006bb4f7fdff141c020b5aff6e10b500001180cc0800190001000000", 0x24) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={r5, 0x20}, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643da974bc765a5091dc23d8b39bf1e026a0627d39b29a70325f9b4c5c402c40687ab0c3470ba91775ccd0e35c8f04936f04b8bbd4e68ce14c62bcb05183ed211f5e8e55335581bc5851a43a50a3b6a1e39a305b50743f566b842c7005d4a62308657feeceeed5cc23535fdcd6c45697a48e5d7d201c17659873ac7ec6738bf6c02078fe083acf122eaf714d7d50beb900fded364c6fc2a1207954e977802ca817867bc04c449e56dc1cd51aad7677daa5fae456671b82c68f3b14319b2a6084a505515026d84dd25b471f9552e71edca03a965fa97672b53ff1f22935", @ANYRESDEC=r2, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_adj\x00') ioctl$sock_inet_SIOCSIFPFLAGS(r6, 0x8934, &(0x7f00000000c0)={'lapb0\x00', 0xb6de}) 17:31:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:58 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast={0xa2, 0xa6, 0xa8, 0x20000040}, @bcast]}, 0x40) 17:31:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12b, 0x0) 17:31:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000f97) 17:31:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000015, 0x0) 17:31:58 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12c, 0x0) 17:31:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\xff', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:58 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x1c}, @bcast]}, 0x40) 17:31:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fa5) 17:31:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rooTmode=00000000000000000040000\a\x00\x00\x00\x00\x00\x00\x00=', @ANYRESDEC=0x0, @ANYBLOB="2c6713bb6e4b13ff481728424d3390c63902b43dddc512c3d09da8702b1e82857e5ed97db68e432bfbb0a813aaa606e0adc88bdc53a48205", @ANYRESDEC=r1, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10002, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f00000000c0)=0x1000) 17:31:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12d, 0x0) 17:31:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000016, 0x0) 17:31:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:59 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x20000040}, @bcast]}, 0x40) 17:31:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fae) 17:31:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000140)='./file0\x00', 0x0) 17:31:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12e, 0x0) 17:31:59 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x40, 0x1c}, @bcast]}, 0x40) 17:31:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\xff', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000017, 0x0) 17:31:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00<', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x12f, 0x0) 17:31:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fb7) 17:31:59 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x40, 0x20000040}, @bcast]}, 0x40) 17:31:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x8c', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x130, 0x0) 17:31:59 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x101000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x80000, 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00000001c0), &(0x7f00000003c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0x2c, "2c795e34ef67345b9318f11ab13e7fefff6df766c31d448893d9ac1d403432ed90e7e7f742ef1d8596108cff"}, &(0x7f00000005c0)=0x34) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000600)={r4, 0xe9, 0x30}, &(0x7f0000000640)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="3cd685", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000680)=0x3, 0x4) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES64=r5, @ANYRES32, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESHEX=r1], @ANYBLOB="c31d696ad1f9fe114338899f10d782751e7cbf1b9c34879d26d5ecaf748023aa58252dcb9c636d1e54c9", @ANYRES32=r1], &(0x7f00000000c0)=0x5) ioctl$KIOCSOUND(r0, 0x4b2f, 0xfffffffffffffff9) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000004c0)={r6, 0x3}) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x7ff}, &(0x7f0000000340)=0x8) 17:31:59 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast={0xa2, 0xa6, 0xa8, 0x1c}]}, 0x40) 17:31:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000018, 0x0) 17:31:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fc0) 17:31:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\xf6', 0x8820, &(0x7f0000000180)='fuse\x00') 17:31:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x131, 0x0) 17:31:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept(r0, &(0x7f0000000080)=@nfc, &(0x7f0000000140)=0x80) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:31:59 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast={0xa2, 0xa6, 0xa8, 0x20000040}]}, 0x40) 17:32:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fc6) 17:32:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000019, 0x0) 17:32:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x132, 0x0) 17:32:00 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x1c}]}, 0x40) 17:32:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40100000003, 0x87) sendto$inet6(r3, &(0x7f0000000080), 0xfc00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}, 0x8}, 0x1c) stat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = dup3(r3, r2, 0x80000) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x1, @bcast, @netrom={'nr', 0x0}, 0x100000001, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x547b, 0x5, [@null, @bcast, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}) 17:32:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:00 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x20000040}]}, 0x40) 17:32:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x133, 0x0) 17:32:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fcf) 17:32:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001a, 0x0) 17:32:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:00 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x40, 0x1c}]}, 0x40) 17:32:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x134, 0x0) 17:32:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fd8) 17:32:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001b, 0x0) 17:32:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2ebf9e2a43329b1c422f5b672c002243d52cd3e87525b65195a703a0b10886eb1c01dee1f449349cca80d92839aac2a7062f1aca3cf81459671dbca41b716d7b35218ef3c27ed6d3ccc1a05626b328f70c2f29e6bac5828d3e96a8de6cb3f7baf0e1064fe31098de1c8fd36025b73abc170cd83dcd141bff550bd907000000111b022cf9c35445f6fdf3fdcc14e9e4791df7975e15e4ab87ff7ade5a3b8f3ac04a3c264327d52d6d14f4b5e7a1d7b7b594dc0c509515503872f83d4c857aa4eb06929cb60005f33c1eb2686d4c472d22b01ec004368160570f1caa86710ff5a185358842a297bf36045d2a"]) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x101400) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000000c0)={0x2, 0xfffffffffffffffa}, 0x2) 17:32:00 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x40, 0x20000040}]}, 0x40) 17:32:00 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x135, 0x0) 17:32:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fe1) 17:32:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:01 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x1c) 17:32:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x136, 0x0) 17:32:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001c, 0x0) 17:32:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='.use\x00') 17:32:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000fec) 17:32:01 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x20000040) 17:32:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x137, 0x0) 17:32:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="687886c336e08f000000f3a221a2a149dabd210b19e9241b95816a6ede3026cbfba69f41954c897fb430650583f0d426b65e7e11", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69647d11a3adeadf55d0d17a2ac377d16d4335fbdbf538255b3ef2ef57fe214e161a33f5be9002d682105371959ed4721d4856133324b77ca6ca047285a4116c2f60f54e5107ffa239d35bf3ff6358fc4b3ec5cdb4fb134145285e9522ee937a82cda1a95bc37c47a2907271113c11", @ANYRESDEC=r1, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='/use\x00') 17:32:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000ff0) 17:32:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001d, 0x0) 17:32:01 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000080)=0xa1f) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000c0}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="080059bd7000ffdbdf2501000000000000000c410000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfffffffffffffffd, 0x8001, 0x3, 0x20, 0x0, 0x1, 0x20, 0x4, 0x8, 0x7, 0x8, 0x7, 0xfffffffffffffffd, 0x2, 0xfffffffffffff000, 0x2, 0x6c, 0x3, 0x2, 0xfffffffffffffbff, 0x2, 0x496, 0xffffffffea021cad, 0x1ff, 0x7, 0x4, 0x1, 0x1140, 0x4, 0x100000001, 0x1, 0x7fffffff, 0x8001, 0x9, 0x8, 0xfffffffffffffffa, 0x0, 0xffff, 0x1, @perf_config_ext={0x98ea, 0x1}, 0x100, 0x7, 0x10000, 0xb, 0x0, 0x8, 0x6}, r1, 0x2, r0, 0x3) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3ff, 0x109000) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e20, @loopback}}) 17:32:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x138, 0x0) 17:32:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x139, 0x0) 17:32:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x149, 0x60840) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000240)={0x0, 0x6, 0x5, &(0x7f00000001c0)=0x1}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fcntl$dupfd(r1, 0x406, r1) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) mkdirat(r0, &(0x7f0000000340)='./file0\x00', 0x11) stat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000140)='fd', 0x2, 0x1) 17:32:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x02') 17:32:01 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x8401, @local, 0x6}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e23, @rand_addr=0xe23c}], 0x3c) bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\xc0') 17:32:01 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x13a, 0x0) 17:32:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x8000f000) 17:32:01 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000040)=0xffffffff00000001) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001e, 0x0) 17:32:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x13b, 0x0) 17:32:02 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:02 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000080)=0x1) 17:32:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000040)='net/netlink\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/netlink\x00') recvfrom$inet(r3, &(0x7f0000000180)=""/120, 0x78, 0x121, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r1, 0x0, 0x80000000) 17:32:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000140)=0x2, 0x4) 17:32:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x13c, 0x0) 17:32:02 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[0x1, 0x100000001, 0x3, 0x4, 0x3, 0x8]}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x4, 0x9f) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x1, 0xa, 0x7, 0x1, 0x3, 0x8, 0x6, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x4, 0x81, 0x4, 0x9, 0x6}, &(0x7f0000000180)=0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000001c0)={0x0, @aes128, 0x2, "70cf2c1d072f39d8"}) getpeername$inet(r1, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f0000000240)=0x10) 17:32:02 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000021, 0x0) 17:32:02 executing program 0: socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000280)={0xa0, 0x0, 0x6, {{0x3, 0x2, 0xfffffffffffffe01, 0x7f, 0x101, 0x3, {0x0, 0x5, 0x80000001, 0x6, 0x8, 0x6, 0x3, 0x100000000, 0x7ff, 0x100000001, 0x6, r2, r3, 0x9, 0x2}}, {0x0, 0x4}}}, 0xa0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r4, r5, 0x0, 0x80000001) 17:32:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x13d, 0x0) 17:32:02 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7fffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x9, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x10001, 0x3, 0x5, 0x7f}, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x7}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r1, 0x4) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) 17:32:02 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\xff') 17:32:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0xffff) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x6) sendfile(r2, r3, 0x0, 0x80000001) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) 17:32:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000Ber_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0\x00', 0x0) 17:32:02 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x13e, 0x0) 17:32:02 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x10001) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cmdline\x00') ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x2) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r2, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x4, 0x70, 0x2e60, 0x9, 0x5, 0xffff, 0x0, 0x9, 0x0, 0x7, 0x6, 0xe87, 0xffffffffffff1300, 0x80000001, 0x5, 0x5, 0x9, 0x1, 0x1, 0x3, 0x0, 0x7fff, 0x7fff, 0x830, 0xfffffffffffff800, 0x20, 0xfffffffffffffff7, 0xd40a, 0x20000000000, 0x0, 0x6aabd17a, 0xbd9, 0x4, 0xfffffffffffffff8, 0x0, 0x3d1, 0x0, 0xfffffffffffffffa, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x10, 0x6, 0x6, 0xf, 0xf7, 0x4, 0x6}) 17:32:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000022, 0x0) 17:32:02 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x400, 0x0) r1 = socket(0xa, 0x10000000003, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x404000) getsockopt$sock_int(r1, 0x1, 0x27, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000040)={0x3ff, 0xfffffffffffffffe, 0x5, 0xf8, 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') 17:32:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x13f, 0x0) 17:32:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rooUmode=0000000000000-000er_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:03 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x82000, 0x0) bind$netrom(r1, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @null, @null]}, 0x48) bind$rose(r0, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x0) write$FUSE_POLL(r2, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x8}}, 0x18) 17:32:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r0, &(0x7f0000000000)=0x4d, 0x0) sendfile(r0, r2, 0x0, 0x80000001) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:32:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\xff') 17:32:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000023, 0x0) 17:32:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x140, 0x0) 17:32:03 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400400, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000140)=""/137) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="099e2429388ae1333595aedd7072dc0a0d00000001000000eb"], 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000040)) r3 = socket(0x10, 0x3, 0x100000001) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r3, r4, 0x0, 0x80000001) 17:32:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x8c') 17:32:03 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x141, 0x0) 17:32:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x142, 0x0) 17:32:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000024, 0x0) 17:32:03 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x6287, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000100)={0x3, @output}) keyctl$get_keyring_id(0x0, r0, 0x7228) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x100, 0x0) openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) bind$rose(r2, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) dup2(r2, r2) 17:32:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f00000000c0)={0x8077}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="00d4"]) stat(&(0x7f0000000480)='./file0\x00', 0x0) 17:32:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\xf6') 17:32:03 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000200)=[r2, 0xee01, 0xee01, 0xee00, r3]) setresgid(r2, r3, r4) sendfile(r0, r1, 0x0, 0x80000001) 17:32:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x143, 0x0) 17:32:03 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @null}, 0x1c) 17:32:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000025, 0x0) 17:32:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xbd, 0x0) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f00000000c0)) 17:32:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:03 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000080)=0x8) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') bind$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @null}, 0x1c) 17:32:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x80f, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:32:03 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x144, 0x0) 17:32:04 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/51) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x145, 0x0) 17:32:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x801, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @empty}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e21, 0x1, @empty, 0x7}}}, &(0x7f00000000c0)=0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r4, r5, 0x0, 0x80000001) 17:32:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:04 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000026, 0x0) 17:32:04 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000080)={0x9, 0x100, 0x8000, 0x1f}) 17:32:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x146, 0x0) 17:32:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000027, 0x0) 17:32:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r1 = socket(0x2, 0x3, 0x100) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:32:04 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x141000, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000200)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r1, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000240)={0x2, 0x0, 0x1, {0x2, 0x9, 0x3450, 0x3}}) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x6, 0x200000) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000440)=0x201ffe) write$capi20(r0, &(0x7f0000000280)={0x10, 0x6, 0x8, 0x83, 0x7f, 0x100000000}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000100)={0x0, 0xffffffffffffff01}) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000340)=[@text32={0x20, &(0x7f00000002c0)="f30f01c866b8a0008ee0b9800000c00f3235000400000f300fbd0bc744240099899103c744240200000000c7442406000000000f011424360f070fc76ef9c4e1255838650f01dff2672e0f0131", 0x4d}], 0x1, 0x27, &(0x7f0000000380)=[@efer={0x2, 0x9000}, @cr4={0x1, 0x2000}], 0x2) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0x6, 0x4) 17:32:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800000000000a3ff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000340)={0xf000, 0xa000}) stat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='personality\x00') setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 17:32:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x147, 0x0) 17:32:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:04 executing program 0: socketpair$unix(0x1, 0x8000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:32:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1426, 0x45120ab8ef2c2490) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x7fff) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x148, 0x0) 17:32:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000028, 0x0) 17:32:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:04 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x3, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null]}, 0x40) syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x33}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r1, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000400)=0xfffffffffffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4041, 0x0) bind$rose(r0, &(0x7f0000000200)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @bcast}, 0x1c) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000280)={0x1, 0x0, [{}]}) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@v2={0x0, 0x0, 0x4, 0xf8, 0x39, "af9a39c225c60420f029006a4043aa0c39847eb22a7edd48dd36355f1bc3e8253c3109083a8f0bbe4dc8fc75d7b86e9cb18bb7e7dd2a321c97"}, 0x43, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x43) 17:32:04 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x149, 0x0) 17:32:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') connect$ax25(r1, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendfile(r1, r2, 0x0, 0x80000001) 17:32:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000480)=""/4096) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000029, 0x0) 17:32:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x1) 17:32:05 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$VT_RELDISP(r1, 0x5605) r2 = fcntl$getown(r1, 0x9) syz_open_procfs(r2, &(0x7f0000000040)='net/packet\x00') accept$inet6(r1, 0x0, &(0x7f0000000080)) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x14a, 0x0) 17:32:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r2, r3, 0x0, 0x80000001) 17:32:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xaf, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000140)={0x7, 0x100000001, 0x3, 'queue1\x00', 0x2}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) fcntl$notify(r1, 0x402, 0xa) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x14b, 0x0) 17:32:05 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x800, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x4, 0x20000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40, 0x0) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:tty_device_t:s0\x00', 0x22, 0x1) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000180)={0x0, 0x3, [{r2}, {r3, 0x0, 0xfffffffffffff000, 0xfffff000}, {r4, 0x0, 0x1fffff000, 0xfffffffffffff000}]}) 17:32:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c67dc047ed9da5ac60169643d8359cdc464ddc5316cd3ff28d41d1e26176c96d3de47240087ec799dd75a531cb451cfbaa8a4e0ac24dd4753dcd8e98e35b946a33da1a8d2c377acc4cd44a4e3a601b3805a7fdf3f28a8fdb0c7da", @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002a, 0x0) 17:32:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'team_slave_0\x00', 0x4}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x7fffffff) 17:32:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000780)={0x9, 0x2, 0x200, 0x1ff, 0x4, 0x0, 0x8, 0xfffffffffffffffd, 0x0}, &(0x7f00000007c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000800)={r3, 0x2, 0x10}, &(0x7f0000000840)=0xc) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x14c, 0x0) 17:32:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='f2fs\x00', 0x8820, &(0x7f0000000200)='#mime_type]}em1^\\\x00') r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000800)={0x0, 0x4c0}, &(0x7f0000000840)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000880)={r1, 0x50, "24c25fdf0b170367752f58348c358b6b0ee3c305a0f73526144974933c22e32ae1a82b0a90d1766755402c00937dcc7249f137e3f560f431e21eb1be30acebd4818f76267954146c544cc1f8d3565486"}, &(0x7f0000000900)=0x58) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x2e0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x210, 0x210, 0x210, 0x210, 0x210, 0x3, &(0x7f0000000140), {[{{@uncond, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x7fff, 0x0, 0x6}, {0x6, 0x80, 0x9019}, 0x2e03, 0x3}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x6ee, 0x2d, 0x1b057e9ca910839c}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x110000, &(0x7f00000003c0)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r3}}], [{@pcr={'pcr', 0x3d, 0x9}}, {@subj_role={'subj_role', 0x3d, ':'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) 17:32:05 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80040, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x7}, &(0x7f0000000140)=0x8) 17:32:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000240)=""/180) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x44}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40c80, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x7f, 0x20, 0x1, 0x6}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x4e24, @multicast1}}, 0x80000001, 0xc4}, 0x90) r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r5, 0x0, 0x80000001) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100)=0x100000001, 0x4) ioctl$void(r1, 0xc0045878) sched_getaffinity(r4, 0x8, &(0x7f0000000200)) 17:32:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002b, 0x0) 17:32:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x8000000000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c001ea5ca7f5af74ff85a18158a737826ce68992adbc9b4787d6bf5f70c53c7e66e71a9ffb352bdf3f8cb79a69a5de19676090d3f9be52c87052d71a16a2fc6650b2518eadc3a67d1f29811"]) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000002c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80200020}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x24, r3, 0x300, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xd22}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:05 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x14d, 0x0) 17:32:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='/desr0\x00\x00\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='hostfs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x400002, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x1, {0x4, 0x4}}, 0x14) 17:32:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x5}, 0x28, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 17:32:05 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x10000, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000080)) 17:32:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x14e, 0x0) 17:32:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1, 0x40) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000200)={0x20, 0x6, 0x4, 0x14, 0xfffffffffffffff7, 0x0, 0x3, 0xa2, 0x1}) 17:32:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:06 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) syz_open_procfs(r0, &(0x7f0000000240)='net/ip_tables_matches\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000140)=@buf={0x1d, &(0x7f0000000080)="2ecdf9e071aba608bc87bda491598e0c05ce3b1b8acda7336fb06be906"}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000280)='\x00', 0xffffffffffffffff}, 0x30) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40000, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x440) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r4, 0xc0305602, &(0x7f00000001c0)={0x0, 0x4d0b, 0x1007, 0x1}) syz_open_procfs(r3, &(0x7f0000000040)='net/H\xc2\x86zzH}\xe4\x1b-\xfd\x93\x9anetlink\x00') sendfile(r2, r2, 0x0, 0xd984) 17:32:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002c, 0x0) 17:32:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x14f, 0x0) 17:32:06 executing program 4: r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@null, @rose, @default, @default, @netrom, @default, @null, @default]}, &(0x7f0000000180)=0x48) connect$netrom(r0, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @null, @bcast, @null, @default]}, 0x48) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r1, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f00000000c0)={r3, 0x20}) connect$pppoe(r2, &(0x7f0000000240)={0x18, 0x0, {0x2, @remote, 'ip_vti0\x00'}}, 0x1e) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0xfffffffffffff886}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r4, 0x70a, 0x7, [0x3, 0x100000001, 0x80000000, 0x3, 0x5, 0x6, 0x6]}, &(0x7f0000000380)=0x16) 17:32:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$sndseq(r0, &(0x7f0000000480)=[{0x3, 0x8001, 0xfffffffffffffff8, 0x10, @tick=0x3, {0x2, 0x7}, {0x81}, @queue={0x0, {0x3, 0x5}}}, {0x9f9, 0x7, 0x5568, 0x200, @time={0x0, 0x1c9c380}, {0x0, 0x3}, {0x400000000, 0x7fff}, @result={0x2, 0x4}}, {0x4, 0x8, 0x1ff, 0x9, @tick=0x5, {0x7fffffff, 0x44d9f41200000}, {0x9, 0x6}, @control={0x7f, 0xddfc, 0x2}}, {0x0, 0x8000, 0x4f6a4cdb, 0x0, @time={0x77359400}, {0x18f6917f, 0x4}, {0x5, 0xe4}, @raw32={[0x800000000000000, 0xfffffffffffffffb, 0x3]}}, {0xa64, 0x2, 0xd8, 0x9, @time={0x0, 0x1c9c380}, {0x7, 0x87}, {0x4, 0x1}, @control={0x4, 0x10000, 0x7ff}}, {0x4, 0x800, 0x1, 0x1, @tick=0x5, {0xffffffff, 0x81}, {0x200, 0x457d}, @addr={0x1000, 0x300000000000}}, {0x7fff, 0x8000, 0x6, 0x1, @tick=0x7f541f3e, {0x7, 0x8}, {0x3f}, @queue={0x3f, {0x10000, 0xffffffffffffffe0}}}, {0x7, 0x1, 0x100, 0x5, @time={0x0, 0x989680}, {0xc718, 0x8001}, {0xff}, @raw32={[0x1000, 0x2, 0x6]}}, {0x1, 0x8, 0x8, 0xffff, @time={0x77359400}, {0xfffffffffffffff7, 0x77c81ec2}, {0x2, 0x20}, @note={0x81f0, 0x4, 0xe5c, 0x438eeba2, 0xee}}], 0x1b0) 17:32:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffffffffff80, 0x4001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000100)={@local, r2}, 0x14) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x2f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r4, r3, 0x0, 0x2) 17:32:06 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x101, 0x200040) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000200)=0x1) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x150, 0x0) 17:32:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002d, 0x0) 17:32:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) accept4$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000340)=0x1c, 0x800) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f00000000c0)=""/80, 0x50}, {&(0x7f0000000180)=""/186, 0xba}, {&(0x7f0000000380)=""/164, 0xfffffffffffffec8}], 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') 17:32:06 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) 17:32:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x151, 0x0) 17:32:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {}, [{0x2, 0x6, r1}, {0x2, 0x7, r1}, {0x2, 0x2, r1}], {0x4, 0x2}, [{0x8, 0x4, r2}, {0x8, 0x4, r2}], {0x10, 0xcd1c27a49af6ae3e}, {0x20, 0x3}}, 0x4c, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:06 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = eventfd(0x1) r1 = getuid() getgroups(0x6, &(0x7f0000000300)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00]) fchown(r0, r1, r2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x208200, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000002c0)={0xb6, 0x100000001, 0x0, 0x0, 0x6, 0x9, 0x7, 0x1, r4}, 0x20) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') 17:32:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='attr/sockcreate\x00') openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000240)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') sendfile(r2, r3, 0x0, 0x80000001) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000180), 0x4) fstat(r0, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000000c0)=""/92) 17:32:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002e, 0x0) 17:32:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x152, 0x0) 17:32:06 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r1, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x92cc2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:32:06 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) mkdirat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x1ff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c6adc92a5045fc653ae34f2d630cccc2a9e237dde9868bb4bf3a82ad833f1834447f050a2f8440bb56fb7a05c7bf83f596a9329c4", @ANYRESDEC=0x0]) ioctl$KVM_RUN(r0, 0xae80, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 17:32:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x40201) write$nbd(r2, &(0x7f0000000480)={0x67446698, 0x1, 0x0, 0x2, 0x1, "c53a41d67c2de05be050b219a82c1c329cf9ba6d7d52922c383d6d14b07083a76815f96342872dcb8bf42b16872a32a15c247b09a9b4882e54685ee9d7b2b1a0d9618631fe5bfbcf89d1a75edfc0627116a15793c6a06a4d97a39edeef07f9a4ed39615f6dc08288be6323b07b004061a73a1c08284866c64fc9cf827761cbd1a91ab2361ea392fecb328db2559f75d7284c85a4d00a30e61381db599f7334a40311fe53bb8408150fde86654947a06dc274a399257751358aab6c1ac030a2eb65a46a9477ed89ecec1bcb6754a38104d429bc28886230882e"}, 0xe9) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:06 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x153, 0x0) 17:32:06 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x40) clone(0x20000, &(0x7f0000000080)="e2d55e5517e7e8accf3773540eb34b5d0db752476df37fc44cc7377d9eff9e4215e516151bca0d60f73a17c606926d374a25315d1bad432abde1b59df33c79602c7deb7284b9ea582dbea1b8758d55f5f3e2807929329b8b0b8c7520e40bbc7e5f9505c51668d24b20cbdd5f0664f94c628e428fd3c67bf6562c141eb3e4355afbd6df126ddc55ff802729cfaffd030374ecf684f5b51b652e15c3da4bcdb13f6f5105d38e3ceaba0ef9b9c708e9d4d689eefb919ab31d", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180)="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") 17:32:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x1, 0x92000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000380)={{0x6, 0x10000}, {0xffff, 0xf3a7}, 0x1, 0x4, 0xd8f}) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000240)=""/82) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:newrole_exec_t:s0\x00', 0xa) sendfile(r2, r3, 0x0, 0x3) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x4000}, &(0x7f0000000340)=0x11e2c9a8feda55f5) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000040)={0x9, 'syz1\x00'}) 17:32:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x154, 0x0) 17:32:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x9, &(0x7f0000ffb000/0x3000)=nil) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file2\x00', &(0x7f00000002c0)='fuse\x00', 0xfffffffffffffffc, &(0x7f0000000080)=ANY=[@ANYBLOB=',group_id=', @ANYRES32=r0]) mount(&(0x7f0000000000)=@filename='./file1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='adfs\x00', 0x8820, &(0x7f0000000180)='f\a\x00\x93m') 17:32:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002f, 0x0) 17:32:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='cgroup\x00') mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x40, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x1ff}}, {@allow_other='allow_other'}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/fuse\x00'}}, {@permit_directio='permit_directio'}]}}) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r4}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x155, 0x0) 17:32:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sysfs$3(0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r2, 0x0, 0x80000001) 17:32:07 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x8, {0x200, 0xff, 0x5, 0x401, 0x1, 0x1}}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="54c638d07e26c643f6c88776af29de50c144340bb59a4d2235bd20dced9d8d690b59181853b593dffd44db5021b75a338732d9dab4e12593e69116fe458dbaf1e6e400847d0f88e13446c43351cfe250fd661ec9303ab925b66622420775b4831d0ecbeed26a0f82834faa00eb4cb532893555fc1ed61a34ca7d7e5eb89d5a714a93432851bb503d15092c71ee8bf76d65b884f84bcea0eda53abffecc9c598f7ea61f84c0733835f0c1fe61af7d7b002b5fe123f67ba60a1aa7babdb4c8a96a78be", @ANYRESDEC=0x0]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x8820, &(0x7f0000000180)='fuse\x00') r2 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x7, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x1f) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r1) 17:32:07 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000001740), &(0x7f0000001780)=0x4) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000080)=""/210, 0xd2}, {&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000280)=""/226, 0xe2}, {&(0x7f0000000380)=""/179, 0xb3}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/218, 0xda}, {&(0x7f0000001540)=""/73, 0x49}, {&(0x7f00000015c0)=""/114, 0x72}], 0x8, 0x0) rseq(&(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={0x0, 0x3, 0xc207, 0x7fff, 0x1}, 0x4}, 0x20, 0x1, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r2, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) 17:32:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x156, 0x0) 17:32:07 executing program 2: lsetxattr$security_ima(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@md5={0x1, "329e4aef651e272984681d8d5a1865c7"}, 0x11, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x84001, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x3, &(0x7f0000000340)=[{&(0x7f0000000480)="72226d6600722c23052416dd7434389c620f280ed130f206a1d346cc823fb540a4b6e7f1de45140490e117d679072b0bab9089f501e7a388cee66b94fce7befd69dd3b7084cca439044cdbec3d0ffe1afefc5561954b572808f49453e1a7d9bdafcb0fbc0156309bc33d0afbf5d02e4ef4790783ba4beb5909a055bf2879e59017f9e8a0302ce0b2bca53bcb226fb606e58508d9e0494afc98954f4b29cc2e225e34357103c33ad6103af7d47f89ca2910c943475b6fd73f7c14efb72520bdaec0c2becef82e73", 0xc7, 0x7}, {&(0x7f0000000140)="a448dd885988aea4d13a6ee9135eb461047e9251b87208ac1264cd5bb0d06d25a9a3e623f48219ee1f546b1fb0ee88fb66cbe77756187acb23801b510b01c5025cc2e3a4be66216ef07eb5315d544b89e5a92009773d07357279336d5e3af899c6e07346130c6ce7eec98dbe367f3463deddbc4b69ea7c33e5ff849d6f3c3c5bc67f60dbf4dcc8179244a451e47e8a1bfe0614a3e98ec3f5b817ab91", 0x9c, 0x7}, {&(0x7f0000000580)="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", 0xfd, 0x10001}], 0x2000095, &(0x7f0000000700)=ANY=[@ANYBLOB="72657363616e5f75fc389d239336aa6f2c61636c2c6e6f656e6f7370635f64656275672c6e6f626172726965722c7573656261636b7570726f6f742c7373645f7370726561642c6d6561737572652c00"]) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="3d7f7e3e5cad0e4bd6337f533665427a8777674552f030b9235958e2440138238e27af310a633ada8ac2447d74c18c3782064550", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000), &(0x7f0000000780)=0x4) 17:32:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000030, 0x0) 17:32:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) sched_getattr(r2, &(0x7f0000000000), 0x30, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) socket$inet(0x2, 0x80003, 0x100000000000) r3 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgid(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000003c0)='{(cpuset\x00', 0xffffffffffffffff}, 0x30) r5 = syz_open_procfs(r4, &(0x7f0000000440)='etp\x9a1on\x94z/Da\xa5s\xc4A\xca\x80\x90\xa8P2((\xd9w\xf9Z\x14r=Z\b\xa2*\xf3N\xba\"\xebkB\x92\x96S\x06\xacT\xb0\xc9+\x17`S\x8d^T\xbc\xa7l4- \xbf\xca\xe2\xb1\xa6M\xca\x10\xc9n\xd1\xe1y\xf4\x196|\x00\xd7\x12u\x16:\x93\x12\x0fm6BT5\x1b\xae\xc8\xeb,\x9fk\x06\xfaX\fkS6z\xbe\xa6qp\x9dr\xcd\xab=R\xf5\xa0,\x8c\xb7\x8a\x8a_}z\x04|H\x03\\\x16\x02\\c\xa8\xc9yL\x9f\x98n\r\x91-\x12{Ph\x1b\x92\x1dL:)\xe7\x02\x92\xfcb{\xce\xc9\xef \x1f\x84K\xe6=Y') sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) 17:32:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x157, 0x0) 17:32:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',g=\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x20800, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000200)={0x0, 0x0, {0x4, 0x8000, 0x8}}) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x68) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000680)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x67) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x2) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66643d67251f626a298c1e4ac93103ccfb66731af1c5f6de4f1b8b0f0e74648205012a4ac143bf45592eeb3a4d9554dfa964f761b466720a8124c20476dd63fdef89148636ce2b4bba4e344584fe665295321d92e752a93f753a4f1b2192c11f1d0d0dd5a2b2c15e3829c109e1d7e55e599111a68505cebe397a2ee2a098f41d962204c9f6e8d0bd040646e085263af516a71e35ca4176d9367db987a67f92654d8c720f3efd2a577787d15323f0681d840ce852e41a0687ba", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4a677238ba000069653d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd00"/35], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="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"/341], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r2, r2) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 17:32:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000031, 0x0) 17:32:07 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xcf, "8fda539805f800197bfb0f8fe137e352ed94eedbb735543e3666cb9892b101c7ef5d8fc73e5b7032a09bbe144ad9ff0e5d4ecc1678d9299c3cc1d734173803d67ae3cbccf1481418f88dff05eb6f47f5402eafcbf7a23bd26e36fd03e72fef96c823320008b322699673940d6c047e3ae2118d030291d7c05be6e0bcb3e7f7a8012241265648e9a480e9d52bfb78444739eeca863a4b12862a464bf93b91e15cd105d0ca8804e4626afbceb6fd2cd14d9988e93a8070a137413e6895d7bf4ff539ff2cd6d19fecc478a14eb3cf4ed6"}, &(0x7f0000000240)=0xd7) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0xbb2}, 0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0xee, 0x101, 0xfffffffffffffffd, 0x1, 0x0, 0x7, 0x500, 0x1, 0x6, 0x18000000, 0x3, 0x8, 0x3, 0xa7a1, 0x0, 0x4, 0x7, 0x4, 0x7a, 0x2, 0x4, 0x6, 0x579, 0x7fff, 0x1, 0x0, 0x68, 0xffffffff, 0x9, 0x2, 0x8001, 0x4, 0x0, 0x9, 0x1, 0x2, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0x1ff}, 0x2002, 0x5d50, 0xfff, 0x6, 0x5, 0x1790, 0x86}, r3, 0xb, r1, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000100)={@ipv4, 0x6e, r4}) openat$dir(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x101000, 0x15) fcntl$getownex(r0, 0x10, &(0x7f0000000440)) 17:32:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setitimer(0x3, &(0x7f0000000080)={{0x0, 0x2710}}, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB='\x00\x00']) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x158, 0x0) 17:32:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') listen(r2, 0x3) sendfile(r1, r2, 0x0, 0x80000001) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000180)) 17:32:07 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x159, 0x0) 17:32:07 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001480)='/dev/dlm_plock\x00', 0x46a7c1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000014c0)=ANY=[@ANYBLOB="03010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000001500)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000001540)={r2, 0x8, 0x30}, &(0x7f0000001580)=0xc) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x0, 0x0, 0x0, 0x400}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r5, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r3, 0x0, 0x12f}]) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000015c0)={0x4, 0x9, 0x7fff, 0x8}, 0x10) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x106) ioctl$BLKRRPART(r6, 0x125f, 0x0) setsockopt$inet6_dccp_buf(r6, 0x21, 0x80, &(0x7f00000000c0)="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", 0x1000) accept4$unix(r4, &(0x7f00000013c0), &(0x7f0000001440)=0x6e, 0x80000) bind$rose(r0, &(0x7f0000000000)=@full={0x2, @remote, @rose, 0x0, [@default, @remote, @null, @null, @bcast, @bcast]}, 0x40) ioctl$VIDIOC_TRY_DECODER_CMD(r6, 0xc0485661, &(0x7f0000001140)={0x4, 0x1, @stop_pts=0x200}) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ubi_ctrl\x00', 0x0, 0x0) timer_create(0x7, &(0x7f00000010c0)={0x0, 0x9, 0x2, @thr={&(0x7f00000011c0)="25f73d6d690e09e19772b7e0dccec1f51d8bd53b28c3b54fa7cf2e31715d8c8949269e7f9d05af455764f82a9d85d216b8a877c8f5fd80f6b2164a97ac1a2f02b1a9db05e3c0201d518e601be38bb45d1e0c7551db15e9937f7efabe6b64e16935a629ccc1c31d9b97a33d053c40b63aab16f6d531aacf605227c5639957cd7f30df7d08de6eca276a01a1cf865a522f7c53205a9e68a10362bc62daadb79b2ba460c26055e4bc48db54add8e67e9110e774d2fec3c787d03df5cdc79e25c595b5", &(0x7f00000012c0)="4267cdbe8dc834ca580c9f46a195656ea5a07a3bff35d587a3de987956ad768cbf6e718c9db1008b67b08a374219dddaad9b31a00d21d5692c8803653aea894ed41fefff167b7f459ec5d7d252e8a97ee5d68727e66159c132595aa25516f8d9a8c7c48d0a2191a1dccf059ab2263296a3801ac98997cbe5e9e02da21cfbc36eb0066b0ec75c03f7ccbe09e3c1"}}, &(0x7f0000001380)=0x0) timer_delete(r8) ioctl$CAPI_INSTALLED(r7, 0x80024322) 17:32:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) stat(&(0x7f0000000040)='./file0\x00', 0x0) 17:32:08 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x15a, 0x0) 17:32:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x40, 0x2, 0x7}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r1, r3, 0x0, 0x80000001) 17:32:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x93ca4eb9}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000032, 0x0) [ 554.831282][T18641] cgroup: fork rejected by pids controller in /syz3 [ 713.583650][ T1042] INFO: task syz-executor.3:18663 blocked for more than 143 seconds. [ 713.592017][ T1042] Not tainted 5.1.0-rc3+ #51 [ 713.597554][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 713.606338][ T1042] syz-executor.3 D28568 18663 7784 0x00000004 [ 713.612798][ T1042] Call Trace: [ 713.616222][ T1042] __schedule+0x817/0x1cc0 [ 713.620920][ T1042] ? __sched_text_start+0x8/0x8 [ 713.625939][ T1042] ? wait_woken+0x250/0x250 [ 713.630542][ T1042] schedule+0x92/0x180 [ 713.634750][ T1042] request_wait_answer+0x42f/0x7c0 [ 713.639905][ T1042] ? queue_interrupt+0x440/0x440 [ 713.645074][ T1042] ? finish_wait+0x260/0x260 [ 713.649979][ T1042] ? kasan_check_read+0x11/0x20 [ 713.655028][ T1042] ? do_raw_spin_unlock+0x57/0x270 [ 713.660443][ T1042] __fuse_request_send+0x12b/0x1d0 [ 713.665936][ T1042] fuse_request_send+0x60/0xa0 [ 713.670922][ T1042] fuse_simple_request+0x2f6/0x740 [ 713.676254][ T1042] fuse_do_getattr+0x24b/0xc80 [ 713.681218][ T1042] ? time_to_jiffies.part.0+0xf0/0xf0 [ 713.686848][ T1042] ? debug_smp_processor_id+0x3c/0x280 [ 713.692600][ T1042] ? __lockdep_free_key_range+0x120/0x120 [ 713.698721][ T1042] ? lockref_get_not_dead+0x70/0x90 [ 713.704217][ T1042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 713.710625][ T1042] fuse_perm_getattr+0x3d/0x60 [ 713.715647][ T1042] fuse_permission+0x3d5/0x530 [ 713.720687][ T1042] ? fuse_getattr+0x360/0x360 [ 713.725579][ T1042] inode_permission+0x36d/0x570 [ 713.730581][ T1042] link_path_walk.part.0+0x9d6/0x1340 [ 713.736220][ T1042] ? walk_component+0x2000/0x2000 [ 713.741413][ T1042] path_openat+0x202/0x46e0 [ 713.746176][ T1042] ? save_stack+0x45/0xd0 [ 713.750682][ T1042] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 713.757083][ T1042] ? kasan_slab_alloc+0xf/0x20 [ 713.762229][ T1042] ? kmem_cache_alloc+0x11a/0x6f0 [ 713.767632][ T1042] ? getname_flags+0xd6/0x5b0 [ 713.772556][ T1042] ? getname+0x1a/0x20 [ 713.778292][ T1042] ? perf_trace_lock+0xeb/0x510 [ 713.783602][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.789913][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.796436][ T1042] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 713.802019][ T1042] ? __lockdep_free_key_range+0x120/0x120 [ 713.808106][ T1042] do_filp_open+0x1a1/0x280 [ 713.812800][ T1042] ? __alloc_fd+0x430/0x530 [ 713.817729][ T1042] ? may_open_dev+0x100/0x100 [ 713.822676][ T1042] ? kasan_check_read+0x11/0x20 [ 713.828029][ T1042] ? do_raw_spin_unlock+0x57/0x270 [ 713.833460][ T1042] do_sys_open+0x3fe/0x5d0 [ 713.838136][ T1042] ? filp_open+0x80/0x80 [ 713.842598][ T1042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 713.848507][ T1042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 713.854434][ T1042] ? do_syscall_64+0x26/0x610 [ 713.859333][ T1042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.866019][ T1042] ? do_syscall_64+0x26/0x610 [ 713.870969][ T1042] __x64_sys_openat+0x9d/0x100 [ 713.875955][ T1042] do_syscall_64+0x103/0x610 [ 713.880739][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.886980][ T1042] RIP: 0033:0x4582b9 [ 713.891087][ T1042] Code: Bad RIP value. [ 713.895384][ T1042] RSP: 002b:00007fdf78abfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 713.904114][ T1042] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 713.916431][ T1042] RDX: 0000000000020800 RSI: 00000000200001c0 RDI: ffffffffffffff9c [ 713.924669][ T1042] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 713.933589][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf78ac06d4 [ 713.941936][ T1042] R13: 00000000004c43c6 R14: 00000000004d7cb8 R15: 00000000ffffffff [ 713.950176][ T1042] [ 713.950176][ T1042] Showing all locks held in the system: [ 713.958219][ T1042] 1 lock held by khungtaskd/1042: [ 713.963526][ T1042] #0: 000000003ab57613 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 713.973346][ T1042] 5 locks held by rs:main Q:Reg/7624: [ 713.978918][ T1042] 1 lock held by rsyslogd/7626: [ 713.984050][ T1042] #0: 000000005fbb6288 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 713.992891][ T1042] 2 locks held by getty/7738: [ 713.997858][ T1042] #0: 0000000065939a1e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.007318][ T1042] #1: 00000000d13866e6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.017493][ T1042] 2 locks held by getty/7739: [ 714.022336][ T1042] #0: 00000000e17dc0dd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.031536][ T1042] #1: 00000000492bbdb5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.041814][ T1042] 2 locks held by getty/7740: [ 714.047089][ T1042] #0: 00000000cc153c70 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.056517][ T1042] #1: 000000004c7b9de6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.066692][ T1042] 2 locks held by getty/7741: [ 714.071554][ T1042] #0: 0000000019881c8d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.080995][ T1042] #1: 000000000647470e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.090994][ T1042] 2 locks held by getty/7742: [ 714.096054][ T1042] #0: 00000000fdcd26ba (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.105312][ T1042] #1: 00000000d6ed5fca (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.115204][ T1042] 2 locks held by getty/7743: [ 714.120057][ T1042] #0: 0000000018bf507e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.129433][ T1042] #1: 0000000030be9735 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.139358][ T1042] 2 locks held by getty/7744: [ 714.144576][ T1042] #0: 00000000240dad2f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 714.153846][ T1042] #1: 00000000c418b63b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 714.163789][ T1042] [ 714.166235][ T1042] ============================================= [ 714.166235][ T1042] [ 714.174895][ T1042] NMI backtrace for cpu 1 [ 714.179510][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3+ #51 [ 714.187080][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.197368][ T1042] Call Trace: [ 714.200689][ T1042] dump_stack+0x172/0x1f0 [ 714.205054][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 714.210378][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 714.216398][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 714.222402][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 714.228328][ T1042] watchdog+0x9b7/0xec0 [ 714.232588][ T1042] kthread+0x357/0x430 [ 714.236790][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 714.242354][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 714.248744][ T1042] ret_from_fork+0x3a/0x50 [ 714.253548][ T1042] Sending NMI from CPU 1 to CPUs 0: [ 714.258971][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x2/0x10 [ 714.260145][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 714.274424][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3+ #51 [ 714.282138][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.292491][ T1042] Call Trace: [ 714.295817][ T1042] dump_stack+0x172/0x1f0 [ 714.300320][ T1042] panic+0x2cb/0x65c [ 714.304236][ T1042] ? __warn_printk+0xf3/0xf3 [ 714.308963][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 714.314632][ T1042] ? ___preempt_schedule+0x16/0x18 [ 714.320124][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 714.326316][ T1042] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 714.332561][ T1042] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 714.338779][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 714.344986][ T1042] watchdog+0x9c8/0xec0 [ 714.349187][ T1042] kthread+0x357/0x430 [ 714.353386][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 714.359020][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 714.365309][ T1042] ret_from_fork+0x3a/0x50 [ 714.371354][ T1042] Kernel Offset: disabled [ 714.375718][ T1042] Rebooting in 86400 seconds..